
Summary
This detection rule targets suspicious executions of PsExec or similar tools within a Windows environment, primarily to identify potential lateral movement and unauthorized command execution across systems. The focus is on instances where the PsExec service may have been renamed or customized, which could suggest malicious use rather than legitimate activity. The rule utilizes Windows Event ID 5145 to flag instances of file share access related to IPC$ (Inter-Process Communication) where the PsExec service typically communicates. The rule further refines its selection by filtering out entries that begin with 'PSEXESVC' to isolate potentially malicious executions from legitimate ones. This approach significantly reduces false positives often associated with legitimate operations of PsExec, allowing security analysts to focus on suspicious activities that could signal an ongoing attack or compromise. Evidence of the effectiveness of this rule is supported by the referenced threat hunting blog post, which discusses similar methodologies for detecting PsExec misuse.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Network Traffic
- Application Log
Created: 2019-04-03