Emerging Threatmediumtest

ScreenConnect User Database Modification - Security

This detects file modifications to the temporary xml user database file indicating local user modification in the ScreenConnect server. This will occur during exploitation of the ScreenConnect Authentication Bypass vulnerability (CVE-2024-1709) in versions <23.9.8, but may also be observed when making legitimate modifications to local users or permissions. This requires an Advanced Auditing policy to log a successful Windows Event ID 4663 events and with a SACL set on the directory.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Matt Anderson, Kris Luzadre, Andrew Schwartz, HuntressCreated Tue Feb 204109cb6a-a4af-438a-9f0c-056abba41c6f2024
Emerging Threat
Active Threat

Developed to detect an active or emerging threat. Prioritize investigation of any alerts and correlate with threat intelligence.

Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security

Definition

Requirements: SACLs must be enabled for the ScreenConnect directory

Detection Logic
Detection Logic1 selector
detection:
    selection:
        EventID: 4663
        ObjectType: 'File'
        AccessMask: '0x6'
        ObjectName|endswith: '.xml'
        ObjectName|contains|all:
            - 'Temp'
            - 'ScreenConnect'
        ProcessName|contains: 'ScreenConnect.Service.exe'
    condition: selection
False Positives

This will occur legitimately as well and will result in some benign activity.

MITRE ATT&CK

Other

cve.2024-1709detection.emerging-threats
Rule Metadata
Rule ID
4109cb6a-a4af-438a-9f0c-056abba41c6f
Status
test
Level
medium
Type
Emerging Threat
Created
Tue Feb 20
Path
rules-emerging-threats/2024/Exploits/CVE-2024-1709/win_security_exploit_cve_2024_1709_user_database_modification_screenconnect.yml
Raw Tags
attack.defense-evasioncve.2024-1709detection.emerging-threats
View on GitHub