heroui logo

DeviceCredentialDeployment Execution

Sigma Rules

View Source
Summary
This detection rule identifies the execution of DeviceCredentialDeployment.exe, a known living-off-the-land binary (LOLBIN) used for defense evasion techniques. Attackers may utilize this executable to obscure malicious processes from standard views in Windows, thereby evading detection by security tools. The rule triggers when a process with the name DeviceCredentialDeployment.exe is initiated, which could indicate potential malicious activity if not part of normal operations. The rule has a medium alert level and is particularly relevant for environments where this binary is not expected to run. Analysts should review execution contexts to determine whether the use of this executable aligns with authorized IT processes.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-08-19