Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_pdq_deploy.yml
T
2022-10-28 15:06:36 +02:00

27 lines
766 B
YAML

title: Use of PDQ Deploy Remote Adminstartion Tool
id: d679950c-abb7-43a6-80fb-2a480c4fc450
status: experimental
description: Detect use of PDQ Deploy remote admin tool
references:
- https://github.com/redcanaryco/atomic-red-team/blob/9e5b12c4912c07562aec7500447b11fa3e17e254/atomics/T1072/T1072.md
- https://www.pdq.com/pdq-deploy/
author: frack113
date: 2022/10/01
tags:
- attack.execution
- attack.lateral_movement
- attack.t1072
logsource:
category: process_creation
product: windows
detection:
selection:
- Description: PDQ Deploy Console
- Product: PDQ Deploy
- Company: PDQ.com
- OriginalFileName: PDQDeployConsole.exe
condition: selection
falsepositives:
- Legitimate use
level: medium