EXPLORE
← Back to Explore
sigmahighHunting

PUA - Wsudo Suspicious Execution

Detects usage of wsudo (Windows Sudo Utility). Which is a tool that let the user execute programs with different permissions (System, Trusted Installer, Administrator...etc)

MITRE ATT&CK

executionprivilege-escalation

Detection Query

selection_metadata:
  - Image|endswith: \wsudo.exe
  - OriginalFileName: wsudo.exe
  - Description: Windows sudo utility
  - ParentImage|endswith: \wsudo-bridge.exe
selection_cli:
  CommandLine|contains:
    - -u System
    - -uSystem
    - -u TrustedInstaller
    - -uTrustedInstaller
    - " --ti "
condition: 1 of selection_*

Author

Nasreddine Bencherchali (Nextron Systems)

Created

2022-12-02

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.executionattack.privilege-escalationattack.t1059
Raw Content
title: PUA - Wsudo Suspicious Execution
id: bdeeabc9-ff2a-4a51-be59-bb253aac7891
status: test
description: Detects usage of wsudo (Windows Sudo Utility). Which is a tool that let the user execute programs with different permissions (System, Trusted Installer, Administrator...etc)
references:
    - https://github.com/M2Team/Privexec/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-12-02
modified: 2023-02-14
tags:
    - attack.execution
    - attack.privilege-escalation
    - attack.t1059
logsource:
    category: process_creation
    product: windows
detection:
    selection_metadata:
        - Image|endswith: '\wsudo.exe'
        - OriginalFileName: 'wsudo.exe'
        - Description: 'Windows sudo utility'
        - ParentImage|endswith: '\wsudo-bridge.exe'
    selection_cli:
        CommandLine|contains:
            - '-u System'
            - '-uSystem'
            - '-u TrustedInstaller'
            - '-uTrustedInstaller'
            - ' --ti '
    condition: 1 of selection_*
falsepositives:
    - Unknown
level: high