SigmaHQ/rules/windows/process_creation/win_susp_renamed_paexec.yml
2021-05-22 10:52:01 +02:00

26 lines
781 B
YAML

title: Renamed PAExec
id: c4e49831-1496-40cf-8ce1-b53f942b02f9
status: experimental
description: Detects suspicious renamed PAExec execution as often used by attackers
references:
- https://www.poweradmin.com/paexec/
author: Florian Roth
date: 2021/05/22
logsource:
category: process_creation
product: windows
detection:
selection1:
Description: 'PAExec Application'
selection2:
OriginalFilename: 'PAExec.exe'
filter:
Image|endswith:
- '\PAexec.exe'
- '\paexec.exe'
condition: ( selection1 or selection2 ) and not filter
falsepositives:
- Weird admins that rename their tools
- Software companies that bundle PAExec with their software and rename it, so that it is less embarrassing
level: high