- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects execution of PurpleSharp, an adversary simulation tool designed to help security teams test detection capabilities.
This detection monitors Windows event logs for process execution events containing indicators of PurpleSharp usage. The detection uses two approaches: looking for process names containing “PurpleSharp.exe” or “purplesharp” in the NewProcessName
field, and checking command lines containing “PurpleSharp” or “xyz123456.exe” (a common test filename used by the tool) in the ProcessCommandLine
field.
PurpleSharp is a legitimate security testing tool that simulates common attack techniques to evaluate detection capabilities. While it has legitimate uses for security teams, unauthorized presence of this tool could indicate either rogue security testing, or potentially an attacker using it to test evasion techniques before launching actual attacks. The tool is designed to emulate various MITRE ATT&CK techniques, making it important to identify when it’s being used in your environment.
{{host}}
where PurpleSharp execution was detected.