
Summary
The rule 'PUA - AdvancedRun Execution' is designed to detect the execution of the AdvancedRun utility, which allows executing programs with various parameters to control how they are run. This utility can be misused in scenarios involving attack execution, privilege escalation, and defense evasion, making it essential to monitor its usage in an enterprise environment. The detection mechanism focuses on process creation logs specifically for the 'AdvancedRun.exe' file. The rule identifies executions that either match the original filename 'AdvancedRun.exe' or contain specific CommandLine arguments associated with typical usage patterns, such as '/EXEFilename', '/Run', and combinations relating to window states and command lines. This approach aims to flag potentially unauthorized or suspicious use of the utility that could indicate adversarial activity.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
Created: 2022-01-20