heroui logo

PUA - CsExec Execution

Sigma Rules

View Source
Summary
The rule "PUA - CsExec Execution" is designed to detect the execution of the remote execution tool CsExec, which is a lesser-known alternative to PsExec. CsExec can be utilized by attackers to execute processes on a remote system, making it critical to identify its usage in order to prevent potential unauthorized access or lateral movement within a network. This detection rule targets the creation of processes specifically related to CsExec by focusing on the image name or description containing 'csexec'. By monitoring the execution of this application, security solutions can flag potentially malicious activity associated with tool misuse. The importance of this rule is underscored by the growing threat landscape, where tools like CsExec are adopted for nefarious purposes. Security teams are encouraged to incorporate this detection rule as part of their endpoint monitoring strategy to bolster defenses against unauthorized remote execution.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Process
  • Application Log
Created: 2022-08-22