Skip to content

Commit

Permalink
Merge PR SigmaHQ#4743 from @nasbench - Increase Coverage For SC Relat…
Browse files Browse the repository at this point in the history
…ed Rule

update: Remote Access Tool - ScreenConnect Potential Suspicious Remote Command Execution - Add more potential child process seen in the wild
  • Loading branch information
nasbench authored Feb 28, 2024
1 parent 6b8cd1f commit 822f0b3
Showing 1 changed file with 7 additions and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -10,9 +10,10 @@ references:
- https://www.mandiant.com/resources/telegram-malware-iranian-espionage
- https://docs.connectwise.com/ConnectWise_Control_Documentation/Get_started/Host_client/View_menu/Backstage_mode
- https://www.huntress.com/blog/slashandgrab-screen-connect-post-exploitation-in-the-wild-cve-2024-1709-cve-2024-1708
- https://www.trendmicro.com/en_us/research/24/b/threat-actor-groups-including-black-basta-are-exploiting-recent-.html
author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems), @Kostastsale
date: 2022/02/25
modified: 2024/02/26
modified: 2024/02/28
tags:
- attack.command_and_control
- attack.t1219
Expand All @@ -25,10 +26,15 @@ detection:
- ':\Windows\TEMP\ScreenConnect\'
- 'run.cmd'
Image|endswith:
- '\bitsadmin.exe'
- '\cmd.exe'
- '\curl.exe'
- '\dllhost.exe'
- '\net.exe'
- '\nltest.exe'
- '\powershell.exe'
- '\pwsh.exe'
- '\rundll32.exe'
- '\wevtutil.exe'
condition: selection
falsepositives:
Expand Down

0 comments on commit 822f0b3

Please sign in to comment.