heroui logo

PsExec/PAExec Escalation to LOCAL SYSTEM

Sigma Rules

View Source
Summary
This detection rule identifies potential misuse of PsExec and PAExec tools to escalate privileges to the LOCAL_SYSTEM account on Windows systems. The rule screens for suspicious command line arguments associated with these tools that are typically used for system administration tasks. The specific command-line flags being monitored include variations such as '-s cmd' or '-s powershell', indicating that they may be used to invoke a shell with elevated privileges. By filtering these command lines, the rule aims to mitigate the risks of unauthorized escalation and potential exploitation of system resources. Given that the misuse of such command tools is a common tactic among threat actors to gain higher-level access, this detection is classified with a high severity level. However, it's important to note that there are legitimate scenarios where system administrators might use these commands for maintenance purposes, which can generate false positives in monitoring. Therefore, understanding the context of their usage is crucial for accurate incident response.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2021-11-23