heroui logo

Use of Remote.exe

Sigma Rules

View Source
Summary
The detection rule focuses on identifying the use of `remote.exe`, a legitimate tool associated with the Windows Debugging Tools, that can be exploited for malicious purposes such as Application Whitelisting (AWL) bypass. The rule is structured to detect instances where the executable is initiated, specifically checking if the image path ends with `\remote.exe` or if the `OriginalFileName` indicates `remote.exe`. This executable is often misused by adversaries to run remote files stealthily while evading detection mechanisms. The rule aims to flag such attempts, while highlighting that the use of `remote.exe` by approved installations of the Windows SDK is a known false positive that should be considered in alerts. The detection is categorized under the process creation logs of Windows, emphasizing the critical need to monitor process-related activities closely for potential defense evasion techniques.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-06-02