
Summary
This rule detects the execution of the RunXCmd utility, which allows users to run commands using System or TrustedInstaller accounts. The detection is based on command line arguments that indicate the presence of specific account types, combined with a command execution pattern. The rule aims to identify potentially malicious activity when commands are executed with elevated privileges that are not typical for standard user operations. It utilizes a condition that checks if both specified account types and the execution command are present in the command line. This is crucial for organizations to prevent unauthorized access or system changes that could compromise security.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-01-24