sequence by process.entity_id
[process where host.os.type == "windows" and process.name : "PsExec.exe" and event.type == "start" and
/* This flag suppresses the display of the license dialog and may
indicate that psexec executed for the first time in the machine */
process.args : "-accepteula" and
not process.executable : ("?:\\ProgramData\\Docusnap\\Discovery\\discovery\\plugins\\17\\Bin\\psexec.exe",
"?:\\Docusnap 11\\Bin\\psexec.exe",
"?:\\Program Files\\Docusnap X\\Bin\\psexec.exe",
"?:\\Program Files\\Docusnap X\\Tools\\dsDNS.exe") and
not process.parent.executable : "?:\\Program Files (x86)\\Cynet\\Cynet Scanner\\CynetScanner.exe"]
[network where host.os.type == "windows" and process.name : "PsExec.exe"]
Install detection rules in Elastic Security
Detect PsExec Network Connection in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).