
Summary
This detection rule is designed to identify potential malicious use of the remote access tool AnyDesk when it is executed from non-standard directories. Adversaries may leverage legitimate remote access software like AnyDesk to create command and control channels, which can facilitate unauthorized access to systems. The detection mechanism watches for processes where AnyDesk is executed from specific locations typically associated with legitimate installations, such as the default application directories. However, the rule specifically flags AnyDesk executions from locations like user-specific AppData folders or custom paths, as these may indicate suspicious activity suggesting an adversary's attempt to obscure their actions. The combination of conditions defined in the detection logic ensures that alerts are raised in scenarios where the presence of AnyDesk is unexpected, particularly outside the standard installation folders, while still allowing for legitimate usage under specific circumstances.
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1219
Created: 2022-05-20