PAExec Service Installation
Detects PAExec service installation
Sigma rule (View on GitHub)
1title: PAExec Service Installation
2id: de7ce410-b3fb-4e8a-b38c-3b999e2c3420
3status: test
4description: Detects PAExec service installation
5references:
6 - https://www.poweradmin.com/paexec/
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2022-10-26
9tags:
10 - attack.execution
11 - attack.t1569.002
12logsource:
13 product: windows
14 service: system
15detection:
16 selection_eid:
17 Provider_Name: 'Service Control Manager'
18 EventID: 7045
19 selection_image:
20 - ServiceName|startswith: 'PAExec-'
21 - ImagePath|startswith: 'C:\WINDOWS\PAExec-'
22 condition: all of selection_*
23falsepositives:
24 - Unknown
25level: medium
References
Related rules
- CSExec Service File Creation
- CSExec Service Installation
- CobaltStrike Service Installations - Security
- CobaltStrike Service Installations - System
- Credential Dumping Tools Service Execution - Security