Remote Access Tool - Anydesk Execution From Suspicious Folder
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)
Sigma rule (View on GitHub)
1title: Remote Access Tool - Anydesk Execution From Suspicious Folder
2id: 065b00ca-5d5c-4557-ac95-64a6d0b64d86
3related:
4 - id: b52e84a3-029e-4529-b09b-71d19dd27e94
5 type: similar
6status: test
7description: |
8 An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks.
9 These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment.
10 Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)
11references:
12 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1219/T1219.md#atomic-test-2---anydesk-files-detected-test-on-windows
13author: Florian Roth (Nextron Systems)
14date: 2022-05-20
15modified: 2023-03-05
16tags:
17 - attack.command-and-control
18 - attack.t1219
19logsource:
20 category: process_creation
21 product: windows
22detection:
23 selection:
24 - Image|endswith: '\AnyDesk.exe'
25 - Description: AnyDesk
26 - Product: AnyDesk
27 - Company: AnyDesk Software GmbH
28 filter:
29 Image|contains:
30 - '\AppData\'
31 - 'Program Files (x86)\AnyDesk'
32 - 'Program Files\AnyDesk'
33 condition: selection and not filter
34falsepositives:
35 - Legitimate use of AnyDesk from a non-standard folder
36level: high
References
Related rules
- Anydesk Temporary Artefact
- DNS Query To AzureWebsites.NET By Non-Browser Process
- GoToAssist Temporary Installation Artefact
- HackTool - Inveigh Execution Artefacts
- HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators