Metasploit / Impacket PsExec Process Creation Activity

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Meant to detect process creations containing names consistent with the schema used by Metasploit or Impacket's PsExec tool. Metasploit and Impacket's PsExec tooling is used by malicious actors for lateral movement & performing actions on remote systems.

Attribute Value
Type Hunting Query
Solution Cyborg Security HUNTER
ID 37cba0d1-8aa5-4f8f-bb26-25a45475ca9a
Tactics Execution
Techniques T1569.002
Required Connectors SecurityEvent
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
SecurityEvent EventID == "4688" ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Cyborg Security HUNTER