Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_pdqdeploy_execution.yml
T

31 lines
858 B
YAML
Raw Normal View History

2023-01-30 20:02:45 +01:00
title: PDQ Deploy Remote Adminstartion Tool Execution
2022-10-02 11:34:33 +02:00
id: d679950c-abb7-43a6-80fb-2a480c4fc450
2023-01-30 20:02:45 +01:00
related:
- id: 12b8e9f5-96b2-41e1-9a42-8c6779a5c184
type: similar
status: test
2022-10-28 15:06:36 +02:00
description: Detect use of PDQ Deploy remote admin tool
2022-10-02 11:34:33 +02:00
references:
- https://github.com/redcanaryco/atomic-red-team/blob/9e5b12c4912c07562aec7500447b11fa3e17e254/atomics/T1072/T1072.md
2022-10-06 09:22:44 +02:00
- https://www.pdq.com/pdq-deploy/
2022-10-02 11:34:33 +02:00
author: frack113
date: 2022-10-01
modified: 2023-01-30
2022-10-06 09:22:44 +02:00
tags:
- attack.execution
- attack.lateral-movement
2022-10-06 09:22:44 +02:00
- attack.t1072
2022-10-02 11:34:33 +02:00
logsource:
category: process_creation
product: windows
detection:
selection:
- Description: PDQ Deploy Console
- Product: PDQ Deploy
- Company: PDQ.com
- OriginalFileName: PDQDeployConsole.exe
condition: selection
falsepositives:
- Legitimate use
level: medium