
Summary
The detection rule titled "Potential Sysinternals Tool Execution" aims to identify the execution of Sysinternals tools on Windows endpoints. Sysinternals, a suite of utilities created by Microsoft, is commonly used for system management and troubleshooting but can be exploited by threat actors for malicious purposes such as information gathering and remote command execution. This rule looks specifically for command line calls that include the '-accepteula' argument, an indication that a Sysinternals tool is being executed. To minimize false positives, it’s advised to allowlist known benign executables using this flag, along with the corresponding usernames normally authorized to use such tools. The logic for this detection is implemented using a SQL-like snowflake query that filters process events from the CrowdStrike EDR logs within the last 2 hours, targeting those processes that match the specified pattern in their command line arguments.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Command
- Logon Session
ATT&CK Techniques
- T1218
Created: 2024-02-09