heroui logo

PUA - PingCastle Execution From Potentially Suspicious Parent

Sigma Rules

View Source
Summary
This detection rule identifies the execution of `PingCastle`, a tool that assesses Active Directory security, when it is invoked from potentially suspicious or uncommon parent process locations. The rule employs attributes such as the command line of the parent process and specific file extensions associated with malicious activities to detect possible unauthorized execution of `PingCastle`. It checks for the calling processes coming from directories known for temporary files or public user files and expects the execution of `PingCastle.exe` itself, with particular command line arguments that indicate security scanning tasks.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2024-01-11