heroui logo

HackTool - WinPwn Execution

Sigma Rules

View Source
Summary
The detection rule titled 'HackTool - WinPwn Execution' focuses on identifying the use of the WinPwn tool, which is widely used for Windows and Active Directory reconnaissance and exploitation. This rule is designed to detect command line executions containing specific keywords associated with the tool, such as 'Offline_Winpwn', 'WinPwn', and variations like 'WinPwn.exe' and 'WinPwn.ps1'. By monitoring process creation events in Windows, the rule aims to highlight potential malicious usage indicative of credential access, defense evasion, exploitation, and other offensive actions typically performed during security assessments or unauthorized intrusions. The significance of detecting WinPwn lies in its capabilities that facilitate unauthorized access to Active Directory environments, making it critical for security practitioners to monitor its usage closely.
Categories
  • Windows
  • Endpoint
  • Cloud
  • Infrastructure
Data Sources
  • Process
ATT&CK Techniques
  • T1082
Created: 2023-12-04