EXPLORE
← Back to Explore
sigmacriticalHunting

HackTool - PurpleSharp Execution

Detects the execution of the PurpleSharp adversary simulation tool

MITRE ATT&CK

resource-development

Detection Query

selection_img:
  - Image|contains: \purplesharp
  - OriginalFileName: PurpleSharp.exe
selection_cli:
  CommandLine|contains:
    - xyz123456.exe
    - PurpleSharp
condition: 1 of selection_*

Author

Florian Roth (Nextron Systems)

Created

2021-06-18

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.t1587attack.resource-development
Raw Content
title: HackTool - PurpleSharp Execution
id: ff23ffbc-3378-435e-992f-0624dcf93ab4
status: test
description: Detects the execution of the PurpleSharp adversary simulation tool
references:
    - https://github.com/mvelazc0/PurpleSharp
author: Florian Roth (Nextron Systems)
date: 2021-06-18
modified: 2023-02-05
tags:
    - attack.t1587
    - attack.resource-development
logsource:
    category: process_creation
    product: windows
detection:
    selection_img:
        - Image|contains: '\purplesharp'
        - OriginalFileName: 'PurpleSharp.exe'
    selection_cli:
        CommandLine|contains:
            - 'xyz123456.exe'
            - 'PurpleSharp'
    condition: 1 of selection_*
falsepositives:
    - Unlikely
level: critical