
Summary
The rule identifies suspicious processes initiated by the ScreenConnect server process (ScreenConnect.Service.exe), which may indicate malicious activity, such as exploitation attempts or unauthorized access via web shell backdoors. The detection mechanism uses EQL (Event Query Language) to filter process events where the parent process is ScreenConnect.Service.exe and the child processes are indicative of suspicious activity, such as cmd.exe, PowerShell, or related executables. This rule is essential for early threat detection, as adversaries often misuse remote support tools like ScreenConnect to execute unauthorized commands or scripts. To refine alerts, it suggests extended investigation steps, including reviewing the alert context, correlating with other events, and examining user accounts and command-line arguments. It outlines potential false positives and includes a comprehensive response and remediation plan, emphasizing isolation of affected systems and thorough reviews of system logs and configurations.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
- Sensor Health
- Network Traffic
ATT&CK Techniques
- T1190
- T1059
- T1059.001
- T1059.003
Created: 2024-03-26