heroui logo

AnyDesk Execution from Suspicious Folder

Anvilogic Forge

View Source
Summary
The detection rule 'AnyDesk Execution from Suspicious Folder' identifies potentially malicious use of AnyDesk, a legitimate remote access software, executed outside recognized installation paths on Windows systems. Adversaries may utilize such software for command and control purposes while circumventing application controls. The rule leverages EDR logs to monitor process execution events within the last two hours, specifically looking for instances of AnyDesk. If AnyDesk is launched from non-standard folders, an alert is triggered. The rule is relevant to various threat actors, including Alloy Taurus and Gamaredon, highlighting the importance of monitoring remote access software within an enterprise environment.
Categories
  • Endpoint
  • Windows
  • Cloud
  • On-Premise
Data Sources
  • Process
  • Application Log
  • File
ATT&CK Techniques
  • T1219
Created: 2024-02-09