heroui logo

Windows Service Execution RemCom

Splunk Security Content

View Source
Summary
This rule is designed to detect the execution of RemCom.exe, a tool commonly used for lateral movement and remote command execution in Windows environments. The analytic leverages logs from various sources such as Sysmon, Windows Event Logs, and EDR solutions to track the execution of processes associated with RemCom.exe. The rule focuses on specific indicators such as process names, original file names, and command-line arguments that may signal malicious activity within the network. The detection of RemCom.exe is critical as it may indicate an ongoing attack, allowing an adversary to execute commands remotely, which could lead to further compromises of affected systems. Analysts are advised to pay close attention to this activity and confirm its legitimacy to prevent unauthorized access and exploitation of network resources.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1569.002
Created: 2025-01-07