heroui logo

Potentially Suspicious Execution Of PDQDeployRunner

Sigma Rules

View Source
Summary
This detection rule identifies potentially suspicious execution of the `PDQDeployRunner`, which is part of the PDQDeploy service. This service is typically used for deploying software packages remotely but can also be abused for malicious purposes. The rule focuses on identifying child processes spawned by `PDQDeployRunner` that include known command-line tools often associated with the execution of malicious scripts or commands, such as `bash.exe`, `cmd.exe`, and various Windows executables that may be used for executing commands in a stealthy manner. The detection logic specifies that it looks for processes that have a parent image containing `PDQDeployRunner` and that also match specific criteria, including file paths and command-line arguments that suggest suspicious activity. Given the legitimate use of PDQDeploy in corporate environments, this rule includes a note regarding potential false positives when the tool is used as intended. This rule is particularly important for organizations that utilize PDQDeploy for IT management while needing to monitor for any anomalies that could indicate misuse or compromise.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-07-22