
Summary
This detection rule targets the creation of the PsExec service file, specifically the file named 'PSEXESVC.exe'. This executable is part of the PsExec utility, which is often used for executing processes on local or remote systems. Effective detection of this file can indicate unauthorized usage or the deployment of malicious operations, as PsExec can be leveraged by attackers for lateral movement within a network. The rule analyzes file events on Windows systems and triggers when a file ends with '\PSEXESVC.exe'. Given that the rule's false positives are classified as 'Unknown', careful tuning or implementation within a known baseline of legitimate activity is recommended. The importance of this rule lies in its capability to spot potentially harmful use of a tool that has legitimate applications in administrative tasks but is frequently abused by malicious actors.
Categories
- Endpoint
- Windows
Data Sources
- File
Created: 2017-06-12