forked from SigmaHQ/sigma
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: new rules related to rat software based on SigmaHQ#2841
- Loading branch information
Showing
3 changed files
with
140 additions
and
4 deletions.
There are no files selected for viewing
48 changes: 48 additions & 0 deletions
48
rules/windows/builtin/security/win_security_service_install_remote_access_software.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
title: Remote Access Tool Services Have Been Installed - Security | ||
id: c8b00925-926c-47e3-beea-298fd563728e | ||
related: | ||
- id: 1a31b18a-f00c-4061-9900-f735b96c99fc | ||
type: similar | ||
status: experimental | ||
description: Detects service installation of different remote access tools software. These software are often abused by threat actors to perform | ||
references: | ||
- https://redcanary.com/blog/misbehaving-rats/ | ||
author: Connor Martin, Nasreddine Bencherchali | ||
date: 2022/12/23 | ||
tags: | ||
- attack.persistence | ||
- attack.t1543.003 | ||
- attack.t1569.002 | ||
logsource: | ||
product: windows | ||
service: security | ||
definition: The 'System Security Extension' audit subcategory need to be enabled to log the EID 4697 | ||
detection: | ||
selection: | ||
EventID: 4697 | ||
ServiceFileName|contains: | ||
# Based on https://github.com/SigmaHQ/sigma/pull/2841 | ||
- 'SSUService' | ||
- 'SplashtopRemoteService' # https://www.splashtop.com/ | ||
- 'Atera' | ||
- 'LogMeIn' # https://www.logmein.com/ | ||
- 'LMIGuardianSvc' # https://www.logmein.com/ | ||
- 'TeamViewer' | ||
- 'RPCService' # https://www.remotepc.com/ | ||
- 'RPCPerformanceService' # https://www.remotepc.com/ | ||
- 'BASupportExpressStandaloneService' # https://www.systemlookup.com/O23/6839-BASupSrvc_exe.html | ||
- 'BASupportExpressSrvcUpdater' # https://www.systemlookup.com/O23/6837-BASupSrvcUpdater_exe.html | ||
- 'GoToMyPC' # https://get.gotomypc.com/ | ||
- 'monblanking' | ||
- 'RManService' # https://www.systemlookup.com/O23/7855-rutserv_exe.html | ||
- 'GoToAssist' # https://www.goto.com/it-management/resolve | ||
- 'AmmyyAdmin' # https://www.ammyy.com/en/ | ||
- 'vncserver' | ||
- 'Parsec' | ||
- 'chromoting' | ||
- 'Zoho' | ||
- 'jumpcloud' | ||
condition: selection | ||
falsepositives: | ||
- Unknown | ||
level: high |
50 changes: 50 additions & 0 deletions
50
rules/windows/builtin/system/win_system_service_install_remote_access_software.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,50 @@ | ||
title: Remote Access Tool Services Have Been Installed - System | ||
id: 1a31b18a-f00c-4061-9900-f735b96c99fc | ||
related: | ||
- id: c8b00925-926c-47e3-beea-298fd563728e | ||
type: similar | ||
status: experimental | ||
description: Detects service installation of different remote access tools software. These software are often abused by threat actors to perform | ||
references: | ||
- https://redcanary.com/blog/misbehaving-rats/ | ||
author: Connor Martin, Nasreddine Bencherchali | ||
date: 2022/12/23 | ||
tags: | ||
- attack.persistence | ||
- attack.t1543.003 | ||
- attack.t1569.002 | ||
logsource: | ||
product: windows | ||
service: system | ||
detection: | ||
selection: | ||
Provider_Name: 'Service Control Manager' | ||
EventID: | ||
- 7045 | ||
- 7036 | ||
ServiceName|contains: | ||
# Based on https://github.com/SigmaHQ/sigma/pull/2841 | ||
- 'SSUService' | ||
- 'SplashtopRemoteService' # https://www.splashtop.com/ | ||
- 'Atera' | ||
- 'LogMeIn' # https://www.logmein.com/ | ||
- 'LMIGuardianSvc' # https://www.logmein.com/ | ||
- 'TeamViewer' | ||
- 'RPCService' # https://www.remotepc.com/ | ||
- 'RPCPerformanceService' # https://www.remotepc.com/ | ||
- 'BASupportExpressStandaloneService' # https://www.systemlookup.com/O23/6839-BASupSrvc_exe.html | ||
- 'BASupportExpressSrvcUpdater' # https://www.systemlookup.com/O23/6837-BASupSrvcUpdater_exe.html | ||
- 'GoToMyPC' # https://get.gotomypc.com/ | ||
- 'monblanking' | ||
- 'RManService' # https://www.systemlookup.com/O23/7855-rutserv_exe.html | ||
- 'GoToAssist' # https://www.goto.com/it-management/resolve | ||
- 'AmmyyAdmin' # https://www.ammyy.com/en/ | ||
- 'vncserver' | ||
- 'Parsec' | ||
- 'chromoting' | ||
- 'Zoho' | ||
- 'jumpcloud' | ||
condition: selection | ||
falsepositives: | ||
- Unknown | ||
level: high |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters