
Summary
The rule identifies the execution of RemCom.exe, an open-source tool used for lateral movement and remote command execution in Windows environments. It utilizes data from various sources such as Sysmon events and Windows event logs to detect instances where RemCom is used. The detection focuses on observing process names, original file names, and the command-line arguments associated with processes. The significance of this rule lies in its potential to indicate unauthorized lateral movement within the enterprise network, which could signify a compromise. If detected, further investigation is warranted as malicious actors may use this tool to conduct remote commands, potentially gaining control over other systems. This rule is now deprecated and replaced by the more accurately named 'Windows Service Execution RemCom.'
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- User Account
- Process
ATT&CK Techniques
- T1570
Created: 2024-12-10