Detection rules › Sigma

Remote Access Tool Services Have Been Installed - Security

Severity
medium
Author
Connor Martin, Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects service installation of different remote access tools software. These software are often abused by threat actors to perform

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1569.002 System Services: Service Execution
PersistenceT1543.003 Create or Modify System Process: Windows Service
Privilege EscalationT1543.003 Create or Modify System Process: Windows Service

Event coverage

ProviderEvent IDTitle
Security-Auditing4697A service was installed in the system.

Stages and Predicates

Stage 1: selection

or:
ServiceName|contains: AmmyyAdmin
ServiceName|contains: AnyDesk
ServiceName|contains: Atera
ServiceName|contains: BASupportExpressSrvcUpdater
ServiceName|contains: 'BASupportExpressStandaloneService'
ServiceName|contains: GoToAssist
ServiceName|contains: GoToMyPC
ServiceName|contains: LMIGuardianSvc
ServiceName|contains: LogMeIn
ServiceName|contains: Parsec
ServiceName|contains: RManService
ServiceName|contains: RPCPerformanceService
ServiceName|contains: RPCService
ServiceName|contains: SSUService
ServiceName|contains: SplashtopRemoteService
ServiceName|contains: TeamViewer
ServiceName|contains: TightVNC
ServiceName|contains: Zoho
ServiceName|contains: chromoting
ServiceName|contains: jumpcloud
ServiceName|contains: monblanking
ServiceName|contains: vncserver

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
ServiceNamematch
  • AmmyyAdmin corpus 2 (sigma 2)
  • AnyDesk corpus 2 (sigma 2)
  • Atera corpus 2 (sigma 2)
  • BASupportExpressSrvcUpdater corpus 2 (sigma 2)
  • BASupportExpressStandaloneService corpus 2 (sigma 2)
  • GoToAssist corpus 2 (sigma 2)
  • GoToMyPC corpus 2 (sigma 2)
  • LMIGuardianSvc corpus 2 (sigma 2)
  • LogMeIn corpus 2 (sigma 2)
  • Parsec corpus 2 (sigma 2)
  • RManService corpus 2 (sigma 2)
  • RPCPerformanceService corpus 2 (sigma 2)
  • RPCService corpus 2 (sigma 2)
  • SSUService corpus 2 (sigma 2)
  • SplashtopRemoteService corpus 2 (sigma 2)
  • TeamViewer corpus 2 (sigma 2)
  • TightVNC corpus 2 (sigma 2)
  • Zoho corpus 2 (sigma 2)
  • chromoting corpus 2 (sigma 2)
  • jumpcloud corpus 2 (sigma 2)
  • monblanking corpus 2 (sigma 2)
  • vncserver corpus 2 (sigma 2)

Neighbors

Broader alternatives (more inclusive than this rule)

These rules match a superset of what this rule catches. They cover the same events plus more. Use them if you want wider coverage and can absorb more false positives.