Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_winpeas_tool.yml
T
2022-10-28 15:06:36 +02:00

41 lines
1.5 KiB
YAML

title: Detect Execution of winPEAS
id: 98b53e78-ebaf-46f8-be06-421aafd176d9
status: experimental
description: WinPEAS is a script that search for possible paths to escalate privileges on Windows hosts. The checks are explained on book.hacktricks.xyz
references:
- https://github.com/carlospolop/PEASS-ng
- https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation
author: Georg Lauenstein
date: 2022/09/19
tags:
- attack.privilege_escalation
- attack.t1082
- attack.t1087
- attack.t1046
logsource:
category: process_creation
product: windows
detection:
selection_basic:
Image|endswith:
- '\winPEASany.exe'
- '\winPEASany_ofs.exe'
- '\winPEASx64.exe'
- '\winPEASx64_ofs.exe'
- '\winPEASx86.exe'
- '\winPEASx86_ofs.exe'
selection_pe:
OriginalFileName: 'winPEAS.exe'
selection_option:
- CommandLine|endswith:
- 'serviceinfo' # Search services information
- 'applicationsinfo' # Search installed applications information
- 'windowscreds' # Search windows credentials
- 'browserinfo ' # Search browser information
- 'fileanalysis' # Search specific files that can contains credentials and for regexes inside files
- CommandLine|contains: '.exe browserinfo ' # Search browser information
condition: 1 of selection*
falsepositives:
- Other programs that use the same command line flags
level: high