Remote Access Tool Services Have Been Installed - System
Detects service installation of different remote access tools software. These software are often abused by threat actors to perform
Sigma rule (View on GitHub)
 1title: Remote Access Tool Services Have Been Installed - System
 2id: 1a31b18a-f00c-4061-9900-f735b96c99fc
 3related:
 4    - id: c8b00925-926c-47e3-beea-298fd563728e
 5      type: similar
 6status: test
 7description: Detects service installation of different remote access tools software. These software are often abused by threat actors to perform
 8references:
 9    - https://redcanary.com/blog/misbehaving-rats/
10author: Connor Martin, Nasreddine Bencherchali
11date: 2022-12-23
12modified: 2023-06-22
13tags:
14    - attack.privilege-escalation
15    - attack.persistence
16    - attack.execution
17    - attack.t1543.003
18    - attack.t1569.002
19logsource:
20    product: windows
21    service: system
22detection:
23    selection:
24        Provider_Name: 'Service Control Manager'
25        EventID:
26            - 7045
27            - 7036
28        ServiceName|contains:
29            # Based on https://github.com/SigmaHQ/sigma/pull/2841
30            - 'AmmyyAdmin' # https://www.ammyy.com/en/
31            - 'Atera'
32            - 'BASupportExpressSrvcUpdater' # https://www.systemlookup.com/O23/6837-BASupSrvcUpdater_exe.html
33            - 'BASupportExpressStandaloneService' # https://www.systemlookup.com/O23/6839-BASupSrvc_exe.html
34            - 'chromoting'
35            - 'GoToAssist' # https://www.goto.com/it-management/resolve
36            - 'GoToMyPC' # https://get.gotomypc.com/
37            - 'jumpcloud'
38            - 'LMIGuardianSvc' # https://www.logmein.com/
39            - 'LogMeIn' # https://www.logmein.com/
40            - 'monblanking'
41            - 'Parsec'
42            - 'RManService' # https://www.systemlookup.com/O23/7855-rutserv_exe.html
43            - 'RPCPerformanceService' # https://www.remotepc.com/
44            - 'RPCService' # https://www.remotepc.com/
45            - 'SplashtopRemoteService' # https://www.splashtop.com/
46            - 'SSUService'
47            - 'TeamViewer'
48            - 'TightVNC' # https://www.tightvnc.com/
49            - 'vncserver'
50            - 'Zoho'
51    condition: selection
52falsepositives:
53    - Unknown
54level: medium
References
Related rules
- CobaltStrike Service Installations - Security
- CobaltStrike Service Installations - System
- CosmicDuke Service Installation
- Potential CobaltStrike Service Installations - Registry
- ProcessHacker Privilege Elevation
