Detectionmediumtest
Remote Access Tool Services Have Been Installed - Security
Detects service installation of different remote access tools software. These software are often abused by threat actors to perform
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Connor Martin, Nasreddine Bencherchali (Nextron Systems)Created Fri Dec 23Updated Sat Dec 07c8b00925-926c-47e3-beea-298fd563728ewindows
Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security
Definition
The 'System Security Extension' audit subcategory need to be enabled to log the EID 4697
Detection Logic
Detection Logic1 selector
detection:
selection:
EventID: 4697
ServiceName|contains:
# Based on https://github.com/SigmaHQ/sigma/pull/2841
- 'AmmyyAdmin' # https://www.ammyy.com/en/
- 'AnyDesk' # https://usersince99.medium.com/windows-privilege-escalation-8214ceaf4db8
- 'Atera'
- 'BASupportExpressSrvcUpdater' # https://www.systemlookup.com/O23/6837-BASupSrvcUpdater_exe.html
- 'BASupportExpressStandaloneService' # https://www.systemlookup.com/O23/6839-BASupSrvc_exe.html
- 'chromoting'
- 'GoToAssist' # https://www.goto.com/it-management/resolve
- 'GoToMyPC' # https://get.gotomypc.com/
- 'jumpcloud'
- 'LMIGuardianSvc' # https://www.logmein.com/
- 'LogMeIn' # https://www.logmein.com/
- 'monblanking'
- 'Parsec'
- 'RManService' # https://www.systemlookup.com/O23/7855-rutserv_exe.html
- 'RPCPerformanceService' # https://www.remotepc.com/
- 'RPCService' # https://www.remotepc.com/
- 'SplashtopRemoteService' # https://www.splashtop.com/
- 'SSUService'
- 'TeamViewer'
- 'TightVNC' # https://www.tightvnc.com/
- 'vncserver'
- 'Zoho'
condition: selectionFalse Positives
The rule doesn't look for anything suspicious so false positives are expected. If you use one of the tools mentioned, comment it out
References
MITRE ATT&CK
Rule Metadata
Rule ID
c8b00925-926c-47e3-beea-298fd563728e
Status
test
Level
medium
Type
Detection
Created
Fri Dec 23
Modified
Sat Dec 07
Path
rules/windows/builtin/security/win_security_service_install_remote_access_software.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.executionattack.t1543.003attack.t1569.002