Detectionhightest

Potential PsExec Remote Execution

Detects potential psexec command that initiate execution on a remote systems via common commandline flags used by the utility

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)Created Tue Feb 28Updated Mon Sep 01ea011323-7045-460b-b2d7-0f7442ea6b38windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic2 selectors
detection:
    selection:
        # Accepting EULA in commandline - often used in automated attacks
        CommandLine|contains|all:
            - 'accepteula'
            - ' -u '
            - ' -p '
            - ' \\\\'
    filter_main_localhost:
        CommandLine|contains:
            - '\\\\localhost'
            - '\\\\127.'
    condition: selection and not 1 of filter_main_*
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Rule Metadata
Rule ID
ea011323-7045-460b-b2d7-0f7442ea6b38
Status
test
Level
high
Type
Detection
Created
Tue Feb 28
Modified
Mon Sep 01
Path
rules/windows/process_creation/proc_creation_win_sysinternals_psexec_remote_execution.yml
Raw Tags
attack.resource-developmentattack.t1587.001
View on GitHub