PsExec Service Installation

Detects PsExec service installation and execution events

Sigma rule (View on GitHub)

 1title: PsExec Service Installation
 2id: 42c575ea-e41e-41f1-b248-8093c3e82a28
 3status: experimental
 4description: Detects PsExec service installation and execution events
 5references:
 6    - https://www.jpcert.or.jp/english/pub/sr/ir_research.html
 7    - https://jpcertcc.github.io/ToolAnalysisResultSheet
 8author: Thomas Patzke
 9date: 2017/06/12
10modified: 2023/08/04
11tags:
12    - attack.execution
13    - attack.t1569.002
14    - attack.s0029
15logsource:
16    product: windows
17    service: system
18detection:
19    selection_eid:
20        Provider_Name: 'Service Control Manager'
21        EventID: 7045
22    selection_service:
23        - ServiceName: 'PSEXESVC'
24        - ImagePath|endswith: '\PSEXESVC.exe'
25    condition: all of selection_*
26falsepositives:
27    - Unknown
28level: medium

References

Related rules

to-top