Rules Contributing to Suspicious PsExec Execution Alert
The following rules detect suspicious SMB traffic related to PsExec Execution activities. Any one or more of these will trigger the Suspicious PsExec Execution Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Suspicious PsExec Execution |
detects execution of psexec or paexec with renamed service name, this rule helps to filter out the noise if psexec is used for legit purposes or if attacker uses a different psexec client other than sysinternal one More details
Rule IDQuery{'selection': {'appid_name': 'smb', 'metadata|contains': ['-stdin', '-stdout', '-stderr']}, 'filter': {'metadata|contains': 'PSEXESVC'}, 'condition': 'selection and not filter'} Log SourceStellar Cyber Network Events configured for:
Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity75 Suppression Logic Based On
Additional Information
|