EXPLORE
← Back to Explore
sigmamediumHunting

Potentially Suspicious Execution Of PDQDeployRunner

Detects suspicious execution of "PDQDeployRunner" which is part of the PDQDeploy service stack that is responsible for executing commands and packages on a remote machines

Detection Query

selection_parent:
  ParentImage|contains: \PDQDeployRunner-
selection_child:
  - Image|endswith:
      - \bash.exe
      - \certutil.exe
      - \cmd.exe
      - \csc.exe
      - \cscript.exe
      - \dllhost.exe
      - \mshta.exe
      - \msiexec.exe
      - \regsvr32.exe
      - \rundll32.exe
      - \scriptrunner.exe
      - \wmic.exe
      - \wscript.exe
      - \wsl.exe
  - Image|contains:
      - :\ProgramData\
      - :\Users\Public\
      - :\Windows\TEMP\
      - \AppData\Local\Temp
  - CommandLine|contains:
      - " -decode "
      - " -enc "
      - " -encodedcommand "
      - " -w hidden"
      - DownloadString
      - FromBase64String
      - http
      - "iex "
      - Invoke-
condition: all of selection_*

Author

Nasreddine Bencherchali (Nextron Systems)

Created

2022-07-22

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.execution
Raw Content
title: Potentially Suspicious Execution Of PDQDeployRunner
id: 12b8e9f5-96b2-41e1-9a42-8c6779a5c184
related:
    - id: d679950c-abb7-43a6-80fb-2a480c4fc450
      type: similar
status: test
description: Detects suspicious execution of "PDQDeployRunner" which is part of the PDQDeploy service stack that is responsible for executing commands and packages on a remote machines
references:
    - https://twitter.com/malmoeb/status/1550483085472432128
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-07-22
modified: 2024-05-02
tags:
    - attack.execution
logsource:
    category: process_creation
    product: windows
detection:
    selection_parent:
        ParentImage|contains: '\PDQDeployRunner-'
    selection_child:
        # Improve this section by adding other suspicious processes, commandlines or paths
        - Image|endswith:
              # If you use any of the following processes legitimately comment them out
              - '\bash.exe'
              - '\certutil.exe'
              - '\cmd.exe'
              - '\csc.exe'
              - '\cscript.exe'
              - '\dllhost.exe'
              - '\mshta.exe'
              - '\msiexec.exe'
              - '\regsvr32.exe'
              - '\rundll32.exe'
              - '\scriptrunner.exe'
              - '\wmic.exe'
              - '\wscript.exe'
              - '\wsl.exe'
        - Image|contains:
              - ':\ProgramData\'
              - ':\Users\Public\'
              - ':\Windows\TEMP\'
              - '\AppData\Local\Temp'
        - CommandLine|contains:
              - ' -decode '
              - ' -enc '
              - ' -encodedcommand '
              - ' -w hidden'
              - 'DownloadString'
              - 'FromBase64String'
              - 'http'
              - 'iex '
              - 'Invoke-'
    condition: all of selection_*
falsepositives:
    - Legitimate use of the PDQDeploy tool to execute these commands
level: medium