PUA - RunXCmd Execution
Detects the use of the RunXCmd tool to execute commands with System or TrustedInstaller accounts
Sigma rule (View on GitHub)
1title: PUA - RunXCmd Execution
2id: 93199800-b52a-4dec-b762-75212c196542
3status: test
4description: Detects the use of the RunXCmd tool to execute commands with System or TrustedInstaller accounts
5references:
6 - https://www.d7xtech.com/free-software/runx/
7 - https://www.winhelponline.com/blog/run-program-as-system-localsystem-account-windows/
8author: Florian Roth (Nextron Systems)
9date: 2022-01-24
10modified: 2023-02-14
11tags:
12 - attack.execution
13 - attack.t1569.002
14 - attack.s0029
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection_account:
20 CommandLine|contains:
21 - ' /account=system '
22 - ' /account=ti '
23 selection_exec:
24 CommandLine|contains: '/exec='
25 condition: all of selection_*
26fields:
27 - CommandLine
28 - ParentCommandLine
29falsepositives:
30 - Legitimate use by administrators
31level: high
References
Related rules
- CSExec Service File Creation
- HackTool Service Registration or Execution
- PUA - NSudo Execution
- PUA - NirCmd Execution
- PUA - NirCmd Execution As LOCAL SYSTEM