Detection of CMD Execution via AnyViewer RMM

Detects cmd shell execution via AnyViewer RMM agent on remote management sessions.

Sigma rule (View on GitHub)

 1title: Detection of CMD Execution via AnyViewer RMM
 2id: bc533330-fc29-44c0-b245-7dc6e5939c87
 3status: experimental
 4description: Detects cmd shell execution via AnyViewer RMM agent on remote management sessions.
 5references:
 6  - https://www.anyviewer.com/help/remote-technical-support.html
 7author: '@kostastsale'
 8date: 2024/08/03
 9tags:
10  - attack.execution
11  - attack.persistence
12logsource:
13  category: process_creation
14  product: windows
15detection:
16  selection:
17    Image|endswith:
18      - '\cmd.exe'
19    ParentImage|endswith:
20      - '\AVCore.exe'
21    ParentCommandLine|contains|all:
22      - 'AVCore.exe" -d'
23  condition: selection
24falsepositives:
25  - Legitimate use for admin activity.
26level: medium```

References

Related rules

to-top