Rules Contributing to Impacket PsExec Execution Alert
    
                                            The following rules detect suspicious SMB traffic related to Impacket PsExec execution. Any one or more of these will trigger the Impacket PsExec Execution Alert. Details for each rule can be viewed by clicking the More Details link in the description.
| Title | Description | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Impacket PsExec Execution | Detects execution of Impacket's psexec.py. More details   Rule IDQuery{'selection_protocol': {'appid_name': 'smb'}, 'selection_sharename': {'metadata|contains': ['IPC$']}, 'selection_relative_target_name': {'metadata|contains': ['RemCom_stdin', 'RemCom_stdout', 'RemCom_stderr']}, 'condition': 'all of selection_*'} Log SourceStellar Cyber Network Events configured for: 
 Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
    N/A
 Severity75 Suppression Logic Based On
 Additional Information
 | 
