Detection rules › Sigma

PUA - AdvancedRun Suspicious Execution

Severity
high
Author
Florian Roth (Nextron Systems)
Source
upstream

Detects the execution of AdvancedRun utility in the context of the TrustedInstaller, SYSTEM, Local Service or Network Service accounts

MITRE ATT&CK coverage

TacticTechniques
Privilege EscalationT1134.002 Access Token Manipulation: Create Process with Token
Defense EvasionT1134.002 Access Token Manipulation: Create Process with Token

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: all of selection

or:
CommandLine|contains: '/CommandLine'
CommandLine|contains: '/EXEFilename'

Stage 2: all of selection_runas

or:
CommandLine|endswith: '/RunAs 10'
CommandLine|endswith: '/RunAs 11'
CommandLine|endswith: '/RunAs 4'
CommandLine|endswith: '/RunAs 8'
CommandLine|contains: ' /RunAs 10 '
CommandLine|contains: ' /RunAs 11 '
CommandLine|contains: ' /RunAs 4 '
CommandLine|contains: ' /RunAs 8 '

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLineends_with
  • /RunAs 10
  • /RunAs 11
  • /RunAs 4
  • /RunAs 8
CommandLinematch
  • /RunAs 10
  • /RunAs 11
  • /RunAs 4
  • /RunAs 8
  • /CommandLine
  • /EXEFilename