heroui logo

Runas Execution in CommandLine

Splunk Security Content

View Source
Summary
This analytic rule detects the execution of the runas.exe process with administrator-level options, indicative of potential privilege escalation attempts or lateral movement within an organization. It utilizes data from Endpoint Detection and Response (EDR) systems, focusing specifically on command-line executions alongside process details captured by Windows security events. The significance of this rule lies in its ability to identify unauthorized access attempts that leverage elevated privileges to execute commands within the target host. By tracking instances of runas.exe being executed, organizations can effectively monitor for and deter potential malicious behavior that could lead to data exfiltration or system compromise. Implementing this detection rule requires integrating logs that provide detailed insight into process runs and command line inputs, ensuring timely and effective response to potential threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Logon Session
  • Process
  • Windows Registry
  • Command
ATT&CK Techniques
  • T1134
  • T1134.001
Created: 2024-11-13