Sysinternals PsSuspend Execution
Detects usage of Sysinternals PsSuspend which can be abused to suspend critical processes
Sigma rule (View on GitHub)
1title: Sysinternals PsSuspend Execution
2id: 48bbc537-b652-4b4e-bd1d-281172df448f
3related:
4 - id: 4beb6ae0-f85b-41e2-8f18-8668abc8af78
5 type: similar
6status: test
7description: Detects usage of Sysinternals PsSuspend which can be abused to suspend critical processes
8references:
9 - https://learn.microsoft.com/en-us/sysinternals/downloads/pssuspend
10 - https://twitter.com/0gtweet/status/1638069413717975046
11author: Nasreddine Bencherchali (Nextron Systems)
12date: 2023-03-23
13tags:
14 - attack.privilege-escalation
15 - attack.discovery
16 - attack.persistence
17 - attack.t1543.003
18logsource:
19 category: process_creation
20 product: windows
21detection:
22 selection:
23 - OriginalFileName: 'pssuspend.exe'
24 - Image|endswith:
25 - '\pssuspend.exe'
26 - '\pssuspend64.exe'
27 condition: selection
28falsepositives:
29 - Unknown
30level: medium
References
Related rules
- Sysinternals PsService Execution
- Allow Service Access Using Security Descriptor Tampering Via Sc.EXE
- CobaltStrike Service Installations - Security
- CobaltStrike Service Installations - System
- CosmicDuke Service Installation