
Summary
This detection rule focuses on identifying the installation of the TacticalRMM (Remote Monitoring and Management) service on Windows systems. TacticalRMM is a tool that can be used for legitimate purposes, but it is also potentially leveraged by threat actors for command and control activities or remote access. The rule triggers when the Windows Event ID 7045 is logged, which indicates a service installation through the Service Control Manager. It looks for specific criteria in the event logs: the provider name must be 'Service Control Manager', and the paths and names associated with the installation must contain 'tacticalrmm.exe' or 'TacticalRMM Agent Service'. All specified conditions must be met for the alert to be generated. While the rule is meant to catch malicious installations, it may produce false positives due to the legitimate usage of TacticalRMM by some administrators. Contextual investigation is needed if an alert is generated to distinguish between legitimate use and potential threats.
Categories
- Windows
Data Sources
- Windows Registry
- Service
Created: 2022-11-28