heroui logo

NetSupport Manager Service Install

Sigma Rules

View Source
Summary
The detection rule identifies the installation of the NetSupport Manager service on Windows systems by monitoring event logs generated by the Service Control Manager. It specifically looks for Event ID 7045, which indicates a service installation event. The rule narrows down potential installations by checking whether the service being installed has an image path that includes 'client32.exe' or has the service name 'Client32'. The detection works under the premise that the installation of such a remote support tool can indicate potential persistence mechanisms used by attackers, hence the classification under persistence attacks. This rule aims to flag any unauthorized or suspicious installations of the NetSupport Manager, which could be used for malicious remote access to the system. False positives may occur due to legitimate use cases where the tool is intentionally installed for remote access by IT support personnel.
Categories
  • Windows
Data Sources
  • Service
  • Application Log
Created: 2022-10-31