heroui logo

Renamed PingCastle Binary Execution

Sigma Rules

View Source
Summary
This detection rule identifies the execution of renamed binaries associated with the "PingCastle" tool, a security assessment scanner used to evaluate the security posture of Active Directory environments. The rule examines process creation events within Windows systems and specifically looks for instances where executable files such as `PingCastleReporting.exe`, `PingCastleCloud.exe`, and `PingCastle.exe` have been renamed as part of an attack vector. The detection logic uses PE (Portable Executable) metadata analysis along with specific command line arguments commonly associated with the execution of PingCastle, particularly scanner options that may indicate malicious intent. The rule flags any executions of these binaries unless they match the expected original file name, indicating potential evasion techniques used by attackers to execute the tool covertly while remaining undetected. The goal is to alert security teams to potentially anomalous behavior that could signify a security compromise in the domain environment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2024-01-11