heroui logo

PUA - PingCastle Execution

Sigma Rules

View Source
Summary
The rule detects the suspicious execution of PingCastle, a known penetration testing tool that assesses the security posture of an Active Directory environment. PingCastle can identify vulnerabilities such as insecure ACLs, service misconfigurations, and unpatched software. When executed, especially with specific command-line arguments, it may indicate an attempt to perform reconnaissance on a network. This rule leverages multiple indicators, including known hashes of the PingCastle executable, command-line parameters typically associated with its scans, and other traits of the process execution. Detection is geared towards identifying both legitimate usage within an organization and potential misuse by threat actors.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2024-01-11