RemCom Service File Creation
Detects default RemCom service filename which indicates RemCom service installation and execution
Sigma rule (View on GitHub)
1title: RemCom Service File Creation
2id: 7eff1a7f-dd45-4c20-877a-f21e342a7611
3status: test
4description: Detects default RemCom service filename which indicates RemCom service installation and execution
5references:
6 - https://github.com/kavika13/RemCom/
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-08-04
9tags:
10 - attack.execution
11 - attack.t1569.002
12 - attack.s0029
13logsource:
14 category: file_event
15 product: windows
16detection:
17 selection:
18 TargetFilename|endswith: '\RemComSvc.exe'
19 condition: selection
20falsepositives:
21 - Unknown
22level: medium
References
Related rules
- CSExec Service File Creation
- HackTool Service Registration or Execution
- PUA - NSudo Execution
- PUA - NirCmd Execution
- PUA - NirCmd Execution As LOCAL SYSTEM