
Summary
The rule named 'First Time Seen Commonly Abused Remote Access Tool Execution' is designed to detect the execution of commonly abused remote access tools (RATs) within Windows environments. It triggers an alert when a process is initiated that matches a set of known RAT names or code signatures, specifically focusing on instances where such processes have not been recorded in the last 30 days. By leveraging the data from various sources such as 'logs-endpoint.events.process-*' and 'winlogbeat-*', this rule allows security analysts to investigate potential unauthorized usage of remote access tools, which adversaries often exploit for command-and-control functions and persistence. Detailed investigation steps are provided to help differentiate between legitimate uses by IT staff and potentially malicious actions. The rule emphasizes the importance of a thorough analysis of the process execution chain and user awareness to mitigate the risks associated with these tools.
Categories
- Endpoint
- Windows
- Cloud
Data Sources
- Process
- Logon Session
- Application Log
ATT&CK Techniques
- T1219
Created: 2023-04-03