<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Psexec — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/psexec/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/psexec/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential WSUS Abuse for Lateral Movement via PsExec</title><link>https://feed.craftedsignal.io/briefs/2024-07-wsus-psexec/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-wsus-psexec/</guid><description>Adversaries may exploit Windows Server Update Services (WSUS) to execute PsExec for lateral movement within a network by abusing the trusted update mechanism to run signed binaries.</description><content:encoded><![CDATA[<p>This detection identifies potential abuse of Windows Server Update Services (WSUS) for lateral movement by executing PsExec. WSUS is designed to manage updates for Microsoft products, ensuring only signed binaries are executed. Attackers can exploit this by using WSUS to distribute and execute Microsoft-signed tools like PsExec, which can then be used to move laterally within the network. This technique leverages the trust relationship inherent in WSUS to bypass security controls. The rule focuses on detecting suspicious processes initiated by <code>wuauclt.exe</code> (the Windows Update client) executing PsExec from the SoftwareDistribution Download Install directories. Defenders should monitor WSUS activity and PsExec executions to detect and respond to this potential threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a system within the target network.</li>
<li>The attacker gains control over the WSUS server or performs a man-in-the-middle attack to spoof WSUS.</li>
<li>The attacker uses the compromised WSUS server to approve a malicious update containing PsExec.</li>
<li>The WSUS client (<code>wuauclt.exe</code>) on targeted machines downloads the &ldquo;approved&rdquo; update from the WSUS server, placing PsExec in the <code>C:\Windows\SoftwareDistribution\Download\Install\</code> directory.</li>
<li>The WSUS client executes PsExec.</li>
<li>PsExec is used to execute commands or transfer files to other systems on the network.</li>
<li>The attacker uses the compromised systems to gather credentials or move laterally to other high-value targets.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve lateral movement within the network, leading to the compromise of additional systems and sensitive data. This can result in data breaches, financial loss, and reputational damage. The scope of impact depends on the level of access achieved by the attacker and the value of the compromised systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>WSUS PsExec Execution</code> to detect potential WSUS abuse involving PsExec execution.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to gain visibility into process executions, as referenced in the <a href="https://ela.st/sysmon-event-1-setup">setup instructions</a>.</li>
<li>Implement enhanced monitoring and logging for WSUS activities to detect unauthorized changes or updates.</li>
<li>Investigate and remove any unauthorized binaries found in the <code>C:\Windows\SoftwareDistribution\Download\Install\</code> directory.</li>
<li>Review and restrict the accounts authorized to manage WSUS to prevent unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>wsus</category><category>psexec</category><category>windows</category></item><item><title>PsExec Lateral Movement via Network Connection</title><link>https://feed.craftedsignal.io/briefs/2024-01-psexec-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-psexec-lateral-movement/</guid><description>The rule identifies the use of PsExec.exe making a network connection, indicative of potential lateral movement by adversaries executing commands with SYSTEM privileges on Windows systems to disable defenses.</description><content:encoded><![CDATA[<p>This detection identifies the execution of PsExec, a dual-use tool commonly employed for both legitimate administration and malicious lateral movement. PsExec, part of the Sysinternals Suite, allows for remote command execution with elevated privileges, often abused by attackers to disable security controls and move laterally within a network. This rule specifically detects the creation of <code>PsExec.exe</code> followed by a network connection initiated by the process, which is a strong indicator of potential malicious activity. While PsExec has legitimate uses, its prevalence in attack scenarios necessitates careful monitoring. The rule is designed to work with data from Elastic Defend, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker uploads or transfers the PsExec tool (<code>PsExec.exe</code>) to the compromised host, potentially using SMB shares or other file transfer methods.</li>
<li>The attacker executes PsExec with the <code>-accepteula</code> flag, which suppresses the license dialog, potentially indicating a first-time execution on the machine.</li>
<li>PsExec establishes a network connection to a remote target system, leveraging SMB/Windows Admin Shares (T1021.002) to facilitate remote command execution.</li>
<li>The attacker uses PsExec to execute commands on the remote system, potentially with SYSTEM privileges, to install malware, gather credentials, or perform reconnaissance.</li>
<li>The attacker leverages the newly compromised system as a pivot point to move laterally to other systems within the network, repeating the process.</li>
<li>The attacker escalates privileges on multiple systems.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to widespread compromise across the network. Attackers can leverage PsExec to gain control over critical systems, disable security controls, and exfiltrate sensitive data. Lateral movement facilitated by PsExec can enable attackers to rapidly expand their footprint within an organization, impacting numerous systems and services. While the rule&rsquo;s severity is low due to the dual-use nature of PsExec, the potential impact of unchecked lateral movement is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>PsExec Network Connection</code> to your SIEM and tune the <code>process.executable</code> and <code>process.parent.executable</code> filters for your environment to reduce false positives.</li>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging for enhanced visibility into PsExec activity.</li>
<li>Review and enforce the principle of least privilege to limit the accounts that can run PsExec and access sensitive systems.</li>
<li>Investigate any alerts generated by the <code>PsExec Network Connection</code> rule promptly to determine if the activity is legitimate or malicious.</li>
<li>Monitor network connections originating from systems where PsExec is executed using the <code>PsExec Outbound Network Connection</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>psexec</category><category>lateral-movement</category><category>windows</category></item><item><title>Suspicious Process Execution via Renamed PsExec Executable</title><link>https://feed.craftedsignal.io/briefs/2024-01-renamed-psexec/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-renamed-psexec/</guid><description>Detects suspicious PsExec activity where the PsExec service component is executed using a custom name, indicating an attempt to evade detections that look for the default PsExec service component name.</description><content:encoded><![CDATA[<p>PsExec is a legitimate remote administration tool developed by Microsoft as part of the Sysinternals Suite, enabling the execution of commands with both regular and SYSTEM privileges on Windows systems. It functions by executing a service component, <code>Psexecsvc.exe</code>, on a remote system, which then runs a specified process and returns the results to the local system. While commonly used by administrators, adversaries frequently abuse PsExec for lateral movement and to execute commands as SYSTEM, effectively disabling defenses and bypassing security protections. This detection identifies instances where the PsExec service component is executed using a custom name, a tactic employed to evade security controls or detections targeting the default PsExec service component name. The rule was last updated on 2026-05-04 and covers Elastic Defend, Windows, M365 Defender, and Crowdstrike data sources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network (e.g., via phishing or exploiting a public-facing application).</li>
<li>The attacker uploads a renamed version of <code>psexesvc.exe</code> to a compromised host.</li>
<li>The attacker uses a tool like the standard <code>PsExec.exe</code> to initiate a remote connection to a target system.</li>
<li>PsExec attempts to copy the renamed <code>psexesvc.exe</code> to the ADMIN$ share on the target system.</li>
<li>The renamed <code>psexesvc.exe</code> is executed as a service on the remote host.</li>
<li>The renamed service executes commands specified by the attacker with SYSTEM privileges.</li>
<li>The results of the commands are returned to the originating system.</li>
<li>The attacker leverages the command execution for lateral movement, data exfiltration, or further compromise of the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete compromise of the target system and potentially the entire network. By executing commands with SYSTEM privileges, attackers can disable security controls, install malware, steal sensitive data, or move laterally to other critical systems. The use of a renamed PsExec executable demonstrates an attempt to evade detection, increasing the likelihood of a successful breach.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Process Execution via Renamed PsExec Executable&rdquo; to your SIEM and tune for your environment to detect the execution of renamed <code>psexesvc.exe</code> executables.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary process execution details for the Sigma rule.</li>
<li>Investigate any alerts generated by this rule promptly, focusing on the commands executed and the target systems involved.</li>
<li>Review and enforce the principle of least privilege to minimize the potential impact of compromised accounts.</li>
<li>Monitor network traffic for SMB connections originating from unusual or untrusted systems, which could indicate PsExec usage.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>psexec</category><category>lateral-movement</category><category>execution</category><category>defense-evasion</category><category>windows</category></item></channel></rss>