
Summary
This rule aims to detect the usage of remote administrative tools such as PsExec, RemCom, PaExec, and CsExec, which are commonly used by threat actors for executing commands on remote systems. The detection logic is implemented in Splunk, focusing on specific event codes related to PowerShell activities that can indicate unauthorized remote executions. The rule analyzes endpoint data for signs of these tools by looking for specific process patterns associated with the execution of remote commands. It incorporates regex to filter for process names indicative of malicious behavior and compiles relevant insights such as timestamps, host information, user accounts, and process hierarchies. This detection is crucial because various high-profile threat actors leverage these tools to move laterally within networks and escalate privileges. Additionally, the rule references techniques used in cyber intrusion frameworks, specifically ATT&CK framework techniques related to lateral movement and command execution, providing a comprehensive detection mechanism for security analysts.
Categories
- Endpoint
- Windows
- Cloud
Data Sources
- Process
- Logon Session
- User Account
- Application Log
- Network Traffic
ATT&CK Techniques
- T1021.002
- T1569.002
- T1021
- T1059.003
- T1570
Created: 2024-02-09