Suspicious Process Execution via Renamed PsExec Executable
Detects suspicious PsExec activity where the PsExec service component is executed using a custom name, indicating an attempt to evade detections that look for the default PsExec service component name.
PsExec is a legitimate remote administration tool developed by Microsoft as part of the Sysinternals Suite, enabling the execution of commands with both regular and SYSTEM privileges on Windows systems. It functions by executing a service component, Psexecsvc.exe, on a remote system, which then runs a specified process and returns the results to the local system. While commonly used by administrators, adversaries frequently abuse PsExec for lateral movement and to execute commands as SYSTEM, effectively disabling defenses and bypassing security protections. This detection identifies instances where the PsExec service component is executed using a custom name, a tactic employed to evade security controls or detections targeting the default PsExec service component name. The rule was last updated on 2026-05-04 and covers Elastic Defend, Windows, M365 Defender, and Crowdstrike data sources.
Attack Chain
- An attacker gains initial access to a system within the network (e.g., via phishing or exploiting a public-facing application).
- The attacker uploads a renamed version of
psexesvc.exeto a compromised host. - The attacker uses a tool like the standard
PsExec.exeto initiate a remote connection to a target system. - PsExec attempts to copy the renamed
psexesvc.exeto the ADMIN$ share on the target system. - The renamed
psexesvc.exeis executed as a service on the remote host. - The renamed service executes commands specified by the attacker with SYSTEM privileges.
- The results of the commands are returned to the originating system.
- The attacker leverages the command execution for lateral movement, data exfiltration, or further compromise of the environment.
Impact
A successful attack can lead to complete compromise of the target system and potentially the entire network. By executing commands with SYSTEM privileges, attackers can disable security controls, install malware, steal sensitive data, or move laterally to other critical systems. The use of a renamed PsExec executable demonstrates an attempt to evade detection, increasing the likelihood of a successful breach.
Recommendation
- Deploy the Sigma rule “Suspicious Process Execution via Renamed PsExec Executable” to your SIEM and tune for your environment to detect the execution of renamed
psexesvc.exeexecutables. - Enable Sysmon process creation logging (Event ID 1) to capture the necessary process execution details for the Sigma rule.
- Investigate any alerts generated by this rule promptly, focusing on the commands executed and the target systems involved.
- Review and enforce the principle of least privilege to minimize the potential impact of compromised accounts.
- Monitor network traffic for SMB connections originating from unusual or untrusted systems, which could indicate PsExec usage.
Detection coverage 2
Suspicious Process Execution via Renamed PsExec Executable
mediumIdentifies suspicious psexec activity which is executing from the psexec service that has been renamed, possibly to evade detection.
PsExec Service Executed from Non-Standard Location
mediumDetects the execution of the PsExec service (psexesvc.exe) from a non-standard location, which could indicate malicious activity.
Detection queries are kept inside the platform. Get full rules →