heroui logo

Psexec Execution

Sigma Rules

View Source
Summary
This detection rule identifies instances of execution involving the PsExec tool, which is commonly used for network administration tasks. The rule is specifically designed to flag processes where the `psexec.exe` image is executed, particularly those that originate from command lines that accept user agreements. Additionally, it targets processes where the original file name is `psexec.c`, indicating a possible direct usage of the PsExec source. This rule is crucial in environments where unauthorized or malicious use of PsExec may indicate lateral movement by an attacker or misuse by internal users. False positives may arise from legitimate administrative scripts that employ PsExec for remote execution across networks. As such, it is important for security teams to validate alerts generated by this rule to distinguish between legitimate activity and potential threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2020-10-30