heroui logo

RemCom Service Installation

Sigma Rules

View Source
Summary
The 'RemCom Service Installation' detection rule focuses on identifying instances where the RemCom service is installed and executed on a Windows system. It functions by monitoring the Windows Event IDs related to the Service Control Manager (EventID 7045), which logs the installation of new services. The detection criteria include both the specific service name 'RemComSvc' and the image path ending with 'RemComSvc.exe', ensuring precise identification of unauthorized service installations. As remote command execution tools like RemCom can be leveraged by attackers for persistence and control over compromised systems, this detection rule is vital for security monitoring and incident response. False positives may arise, but they are currently listed as unknown, indicating a need for further tuning based on operational environment characteristics. This rule is integral for defense-in-depth strategies in securing Windows environments against service-based attacks.
Categories
  • Windows
  • Endpoint
Data Sources
  • Service
  • Logon Session
Created: 2023-08-07