heroui logo

Potential PsExec Remote Execution

Sigma Rules

View Source
Summary
This detection rule is designed to identify the potential use of PsExec, a command-line tool developed by Sysinternals, which allows for the execution of processes on remote systems. The rule focuses on the command-line flags commonly associated with PsExec, including indicators such as 'accepteula', '-u' (for username), and '-p' (for password), as well as the presence of backslashes (\\) which may suggest escaping characters in the command. When these flags are detected in process creation logs on Windows systems, it potentially signifies an unauthorized or suspicious remote command execution attempt, which could be indicative of malware activity or system compromises. This rule targets processes that initiate with these command-line arguments in order to alert security analysts of possible remote execution exploits leveraging the PsExec utility, which has been historically utilized by attackers to escalate privileges and move laterally within networks.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2023-02-28