Remote Access Tool Services Have Been Installed - Security
Detects service installation of different remote access tools software. These software are often abused by threat actors to perform
Sigma rule (View on GitHub)
1title: Remote Access Tool Services Have Been Installed - Security
2id: c8b00925-926c-47e3-beea-298fd563728e
3related:
4 - id: 1a31b18a-f00c-4061-9900-f735b96c99fc
5 type: similar
6status: test
7description: Detects service installation of different remote access tools software. These software are often abused by threat actors to perform
8references:
9 - https://redcanary.com/blog/misbehaving-rats/
10author: Connor Martin, Nasreddine Bencherchali (Nextron Systems)
11date: 2022-12-23
12modified: 2023-11-15
13tags:
14 - attack.persistence
15 - attack.t1543.003
16 - attack.t1569.002
17logsource:
18 product: windows
19 service: security
20 definition: The 'System Security Extension' audit subcategory need to be enabled to log the EID 4697
21detection:
22 selection:
23 EventID: 4697
24 ServiceName|contains:
25 # Based on https://github.com/SigmaHQ/sigma/pull/2841
26 - 'AmmyyAdmin' # https://www.ammyy.com/en/
27 - 'Atera'
28 - 'BASupportExpressSrvcUpdater' # https://www.systemlookup.com/O23/6837-BASupSrvcUpdater_exe.html
29 - 'BASupportExpressStandaloneService' # https://www.systemlookup.com/O23/6839-BASupSrvc_exe.html
30 - 'chromoting'
31 - 'GoToAssist' # https://www.goto.com/it-management/resolve
32 - 'GoToMyPC' # https://get.gotomypc.com/
33 - 'jumpcloud'
34 - 'LMIGuardianSvc' # https://www.logmein.com/
35 - 'LogMeIn' # https://www.logmein.com/
36 - 'monblanking'
37 - 'Parsec'
38 - 'RManService' # https://www.systemlookup.com/O23/7855-rutserv_exe.html
39 - 'RPCPerformanceService' # https://www.remotepc.com/
40 - 'RPCService' # https://www.remotepc.com/
41 - 'SplashtopRemoteService' # https://www.splashtop.com/
42 - 'SSUService'
43 - 'TeamViewer'
44 - 'TightVNC' # https://www.tightvnc.com/
45 - 'vncserver'
46 - 'Zoho'
47 condition: selection
48falsepositives:
49 - The rule doesn't look for anything suspicious so false positives are expected. If you use one of the tools mentioned, comment it out
50level: medium
References
Related rules
- CosmicDuke Service Installation
- Remote Access Tool Services Have Been Installed - System
- Malicious Service Installations
- Allow Service Access Using Security Descriptor Tampering Via Sc.EXE
- CobaltStrike Service Installations - Security