
Summary
This detection rule identifies the installation and execution of the PsExec service on Windows systems. PsExec is a Sysinternals tool that enables the execution of processes on remote systems and is often used in both legitimate and malicious contexts. The rule is based on monitoring Windows Event ID 7045, which indicates that a service has been installed. Specific conditions look for the service named 'PSEXESVC' or any service installation that ends with the executable path '\PSEXESVC.exe'. Ensuring that detections account for both triggered events (the creation of the PsExec service) and the actual service invocation helps mitigate against unauthorized remote execution. The rule has a medium severity level, indicating it may warrant attention but is not immediately critical. The potential for false positives is noted as 'Unknown', as other factors may trigger similar events in the system logs. The rule serves as an important part of monitoring Windows environments for unusual or suspicious service installations that could indicate exploitation attempts or lateral movement within a network.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Service
- Logon Session
Created: 2017-06-12