heroui logo

Remote Access Tool - ScreenConnect Server Web Shell Execution

Sigma Rules

View Source
Summary
This detection rule is designed to identify potential web shell execution originating from the ScreenConnect server process, specifically by monitoring process creation events on Windows systems. The rule leverages the relationship between processes, looking for instances where the parent process is 'ScreenConnect.Service.exe', combined with child processes that are typically associated with command execution, such as 'cmd.exe' or 'csc.exe'. By establishing this association, the detection aims to reveal unauthorized access or exploitation scenarios that could lead to initial access on the system. The rule is classified under high severity due to the significant implications of successful exploitation, particularly in enterprise environments where remote access tools can be misused to gain control over systems without proper authorization.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2024-02-26