| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1136 | .002 | Create Account: Domain Account |
PsExec has the ability to remotely create accounts on target systems.[3] |
| Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
PsExec can leverage Windows services to escalate privileges from administrator to SYSTEM with the |
| Enterprise | T1570 | Lateral Tool Transfer |
PsExec can be used to download or upload a file over a network share.[4] |
|
| Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares |
PsExec, a tool that has been used by adversaries, writes programs to the |
| Enterprise | T1569 | .002 | System Services: Service Execution |
Microsoft Sysinternals PsExec is a popular administration tool that can be used to execute binaries on remote systems using a temporary Windows service.[1] |
| ID | Name | Description |
|---|---|---|
| C0004 | CostaRicto |
During CostaRicto, threat actors used PsExec.[60] |
| C0002 | Night Dragon |
During Night Dragon, threat actors used PsExec to remotely execute droppers.[61] |
| C0023 | Operation Ghost |
For Operation Ghost, APT29 used PsExec for lateral movement on compromised networks.[36] |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors used PsExec to interact with other systems inside the internal network.[62] |
| C0058 | SharePoint ToolShell Exploitation |