heroui logo

PsExec Network Connection

Elastic Detection Rules

View Source
Summary
The detection rule identifies the execution of the SysInternals tool PsExec.exe, particularly when it makes a network connection, suggesting possible lateral movement in the environment. PsExec is commonly used for remote administration on Windows systems and can be leveraged by attackers for various malicious activities, including disabling security measures and gaining unauthorized access to system resources. The detection logic looks for instances where PsExec.exe initiates processes with a specific command-line argument that suppresses the license dialog, often indicating first-time execution. The alert includes methods for further investigation and outlines response actions to mitigate potential threats from identified instances of this tool's use. Analysts are advised to compare findings against established baselines for legitimate usage within their environment and take necessary precautions if the use of PsExec appears suspicious.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1569
  • T1569.002
  • T1021
  • T1021.002
  • T1570
Created: 2020-02-18