
Summary
This rule aims to detect instances where the PsExec service (commonly referred to as PSEXESVC) is executed after being renamed—an action that is atypical for legitimate administrative use. PsExec is a Microsoft Sysinternals tool that allows execution of processes on remote systems, and its service component can be abused by attackers to execute malicious payloads stealthily. The detection logic targets processes created with the original file name 'psexesvc.exe' that are executed from a renamed file path, specifically monitoring for unusual behavior around its legacy name. By focusing on this anomaly, security teams can identify and investigate potential unauthorized actions that might indicate a security breach, particularly in environments where the use of such tools is strictly controlled.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-07-21