Detection rules › Sigma

PSEXEC Remote Execution File Artefact

Severity
high
Author
Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects creation of the PSEXEC key file. Which is created anytime a PsExec command is executed. It gets written to the file system and will be recorded in the USN Journal on the target system

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1136.002 Create Account: Domain Account, T1543.003 Create or Modify System Process: Windows Service
Privilege EscalationT1543.003 Create or Modify System Process: Windows Service
Lateral MovementT1570 Lateral Tool Transfer

Event coverage

ProviderEvent IDTitle
Sysmon11FileCreate

Stages and Predicates

Stage 1: selection

TargetFilename|endswith: .key
TargetFilename|startswith: 'C:\Windows\PSEXEC-'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
TargetFilenameends_with
  • .key corpus 2 (sigma 2)
TargetFilenamestarts_with
  • C:\Windows\PSEXEC-