heroui logo

Program Executed Using Proxy/Local Command Via SSH.EXE

Sigma Rules

View Source
Summary
This detection rule is designed to identify potential misuse of the 'ssh.exe' binary on Windows systems, especially when it is utilized as a proxy for executing other commands or launching applications. The determination is made by examining process creation logs to spot instances where 'ssh.exe' is used in conjunction with specific command line flags that suggest potential abuse. The relevant flags that indicate proxy usage are 'ProxyCommand=' or any flag indicating local command execution like 'PermitLocalCommand' or 'LocalCommand'. If 'ssh.exe' is found as a child process of 'sshd.exe', or if it appears with the specified command line arguments, it will trigger an alert. This rule acts as a preventative security measure against command-and-control activities or unauthorized command execution via legitimate SSH mechanisms.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Application Log
Created: 2022-12-29