heroui logo

Remote Access Tool - ScreenConnect Command Execution

Sigma Rules

View Source
Summary
This detection rule identifies instances of command execution through the ScreenConnect remote management tool. ScreenConnect is a legitimate remote access software that can be exploited by attackers to execute commands on compromised machines. The rule triggers on specific events where the provider name is 'ScreenConnect', the event ID corresponds to an execution command, and the logged data contains a reference to 'Executed command of length'. This combination of parameters helps to pinpoint potential malicious activity associated with remote command execution, which is a tactic often used in various attacks including those related to ransomware. While this rule is essential for recognizing potential misuse of ScreenConnect, it is important to manage false positives, particularly from legitimate operational use of the software by authorized users.
Categories
  • Endpoint
  • Windows
Data Sources
  • Application Log
  • Process
Created: 2023-10-10