Detect MeshAgent Command Execution via MeshCentral
Detects the use of MeshAgent to execute commands on the target host, particularly when threat actors might abuse it to execute commands directly. MeshAgent can execute commands on the target host by leveraging win-console to obscure their activities and win-dispatcher to run malicious code through IPC with child processes.
Sigma rule (View on GitHub)
1title: Detect MeshAgent Command Execution via MeshCentral
2id: 74a2b202-73e0-4693-9a3a-9d36146d0775
3status: Experimental
4description: |
5 Detects the use of MeshAgent to execute commands on the target host, particularly when threat actors might abuse it to execute commands directly.
6 MeshAgent can execute commands on the target host by leveraging win-console to obscure their activities and win-dispatcher to run malicious code through IPC with child processes.
7author: '@Kostastsale'
8references:
9 - https://github.com/Ylianst/MeshAgent
10 - https://github.com/Ylianst/MeshAgent/blob/52cf129ca43d64743181fbaf940e0b4ddb542a37/modules/win-dispatcher.js#L173
11 - https://github.com/Ylianst/MeshAgent/blob/52cf129ca43d64743181fbaf940e0b4ddb542a37/modules/win-info.js#L55
12tags:
13 - attack.command_and_control
14 - attack.t1219
15date: 2024-09-20
16logsource:
17 product: windows
18 category: process_creation
19detection:
20 selection_parent:
21 ParentImage|endswith:
22 - '\meshagent.exe'
23 selection_child:
24 Image|endswith:
25 - '\cmd.exe'
26 - '\powershell.exe'
27 condition: selection_parent and selection_child
28falsepositives:
29 - False positives can be found in environments using MessAgent for remote management, analysis should prioritize the grandparent process, MessAgent.exe, and scrutinize the resulting child processes triggered by any suspicious interactive commands directed at the target host.
30level: medium```
References
Related rules
- AnyDesk Network
- SplashTop Network
- SplashTop Process
- Remote Access Tool - AnyDesk Incoming Connection
- Anydesk Temporary Artefact