
Summary
The 'PUA - NSudo Execution' rule is designed to identify the execution of the NSudo tool on Windows systems, which is often used to run processes with elevated privileges, including the System account. By monitoring the creation of processes that correspond to NSudo's executables, namely 'NSudo.exe', 'NSudoLC.exe', and 'NSudoLG.exe', this rule captures potentially malicious or unauthorized use. The detection logic focuses on command lines that include specific flags indicative of usage with elevated controls. Given that NSudo can be employed legitimately by system administrators for administrative tasks, the rule acknowledges the possibility of false positives stemming from such legitimate usage. The high severity level signals that detection of NSudo execution should be treated with high priority due to the implications for system security when used improperly or maliciously.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-01-24