TacticalRMM Service Installation
Detects a TacticalRMM service installation. Tactical RMM is a remote monitoring & management tool.
Sigma rule (View on GitHub)
1title: TacticalRMM Service Installation
2id: 4bb79b62-ef12-4861-981d-2aab43fab642
3status: test
4description: Detects a TacticalRMM service installation. Tactical RMM is a remote monitoring & management tool.
5references:
6 - https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2022-11-28
9tags:
10 - attack.command-and-control
11 - attack.t1219
12logsource:
13 product: windows
14 service: system
15detection:
16 selection_root:
17 Provider_Name: 'Service Control Manager'
18 EventID: 7045
19 selection_service:
20 - ImagePath|contains: 'tacticalrmm.exe'
21 - ServiceName|contains: 'TacticalRMM Agent Service'
22 condition: all of selection_*
23falsepositives:
24 - Legitimate use of the tool
25level: medium
References
Related rules
- Anydesk Temporary Artefact
- DNS Query To AzureWebsites.NET By Non-Browser Process
- GoToAssist Temporary Installation Artefact
- HackTool - Inveigh Execution Artefacts
- HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators