SigmaHQ/rules/windows/process_creation/win_susp_renamed_paexec.yml
2021-07-06 10:09:47 +02:00

27 lines
802 B
YAML

title: Renamed PAExec
id: c4e49831-1496-40cf-8ce1-b53f942b02f9
status: experimental
description: Detects suspicious renamed PAExec execution as often used by attackers
references:
- https://www.poweradmin.com/paexec/
author: Florian Roth
date: 2021/05/22
modified: 2021/07/06
logsource:
category: process_creation
product: windows
detection:
selection1:
Description: 'PAExec Application'
selection2:
OriginalFileName: 'PAExec.exe'
filter:
Image|endswith:
- '\PAexec.exe'
- '\paexec.exe'
condition: ( selection1 or selection2 ) and not filter
falsepositives:
- Weird admins that rename their tools
- Software companies that bundle PAExec with their software and rename it, so that it is less embarrassing
level: high