Skip to content

Commit 3eaad9a

Browse files
authored
Merge pull request #3312 from nterl0k/nterl0k-rmm-story-update-1
Nterl0k - RMM Story and Detection Update, Again
2 parents 93f33cc + 9658514 commit 3eaad9a

8 files changed

+83
-9
lines changed

detections/endpoint/detect_remote_access_software_usage_file.yml

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage File
22
id: 3bf5541a-6a45-4fdc-b01d-59b899fff961
3-
version: 5
3+
version: 6
44
date: '2024-11-13'
55
author: Steven Dick
66
status: production
@@ -54,6 +54,10 @@ drilldown_searches:
5454
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
5555
earliest_offset: $info_min_time$
5656
latest_offset: $info_max_time$
57+
- name: Investigate files on $dest$
58+
search: '| from datamodel:Endpoint.Filesystem | search dest=$dest$ file_name=$file_name$'
59+
earliest_offset: $info_min_time$
60+
latest_offset: $info_max_time$
5761
rba:
5862
message: A file for known a remote access software [$file_name$] was created on
5963
$dest$ by $user$.
@@ -67,13 +71,16 @@ rba:
6771
threat_objects:
6872
- field: file_name
6973
type: file_name
74+
- field: signature
75+
type: signature
7076
tags:
7177
analytic_story:
7278
- Insider Threat
7379
- Command And Control
7480
- Ransomware
7581
- Gozi Malware
7682
- CISA AA24-241A
83+
- Remote Monitoring and Management Software
7784
asset_type: Endpoint
7885
mitre_attack_id:
7986
- T1219

detections/endpoint/detect_remote_access_software_usage_fileinfo.yml

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage FileInfo
22
id: ccad96d7-a48c-4f13-8b9c-9f6a31cba454
3-
version: 5
3+
version: 6
44
date: '2024-11-13'
55
author: Steven Dick
66
status: production
@@ -47,22 +47,32 @@ drilldown_searches:
4747
| `security_content_ctime(lastTime)`'
4848
earliest_offset: $info_min_time$
4949
latest_offset: $info_max_time$
50+
- name: Investigate processes on $dest$
51+
search: '| from datamodel:Endpoint.Processes| search dest=$dest$ process_name=$process_name$'
52+
earliest_offset: $info_min_time$
53+
latest_offset: $info_max_time$
5054
rba:
5155
message: A file attributes for known a remote access software [$process_name$] was
5256
detected on $dest$
5357
risk_objects:
5458
- field: dest
5559
type: system
5660
score: 25
61+
- field: user
62+
type: user
63+
score: 25
5764
threat_objects:
5865
- field: process_name
5966
type: process_name
67+
- field: signature
68+
type: signature
6069
tags:
6170
analytic_story:
6271
- Insider Threat
6372
- Command And Control
6473
- Ransomware
6574
- Gozi Malware
75+
- Remote Monitoring and Management Software
6676
asset_type: Endpoint
6777
mitre_attack_id:
6878
- T1219

detections/endpoint/detect_remote_access_software_usage_process.yml

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage Process
22
id: ffd5e001-2e34-48f4-97a2-26dc4bb08178
3-
version: 5
3+
version: 6
44
date: '2024-11-13'
55
author: Steven Dick
66
status: production
@@ -59,6 +59,10 @@ drilldown_searches:
5959
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
6060
earliest_offset: $info_min_time$
6161
latest_offset: $info_max_time$
62+
- name: Investigate processes on $dest$
63+
search: '| from datamodel:Endpoint.Processes| search dest=$dest$ process_name=$process_name$'
64+
earliest_offset: $info_min_time$
65+
latest_offset: $info_max_time$
6266
rba:
6367
message: A process for a known remote access software $process_name$ was identified
6468
on $dest$.
@@ -72,13 +76,16 @@ rba:
7276
threat_objects:
7377
- field: process_name
7478
type: process_name
79+
- field: signature
80+
type: signature
7581
tags:
7682
analytic_story:
7783
- Insider Threat
7884
- Command And Control
7985
- Ransomware
8086
- Gozi Malware
8187
- CISA AA24-241A
88+
- Remote Monitoring and Management Software
8289
asset_type: Endpoint
8390
mitre_attack_id:
8491
- T1219

detections/endpoint/detect_remote_access_software_usage_registry.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage Registry
22
id: 33804986-25dd-43cf-bb6b-dc14956c7cbc
3-
version: 2
3+
version: 3
44
date: '2025-01-10'
55
author: Steven Dick
66
status: production
@@ -60,6 +60,7 @@ tags:
6060
- Ransomware
6161
- Gozi Malware
6262
- CISA AA24-241A
63+
- Remote Monitoring and Management Software
6364
asset_type: Endpoint
6465
mitre_attack_id:
6566
- T1219

detections/network/detect_remote_access_software_usage_dns.yml

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage DNS
22
id: a16b797d-e309-41bd-8ba0-5067dae2e4be
3-
version: 5
3+
version: 6
44
date: '2024-11-15'
55
author: Steven Dick
66
status: production
@@ -52,21 +52,28 @@ drilldown_searches:
5252
| `security_content_ctime(lastTime)`'
5353
earliest_offset: $info_min_time$
5454
latest_offset: $info_max_time$
55+
- name: Investigate traffic to $query$
56+
search: '| from datamodel:Network_Resolution.DNS | search src=$src$ query=$query$'
57+
earliest_offset: $info_min_time$
58+
latest_offset: $info_max_time$
5559
rba:
5660
message: A domain for a known remote access software $query$ was contacted by $src$.
5761
risk_objects:
5862
- field: src
5963
type: system
60-
score: 4
64+
score: 25
6165
threat_objects:
6266
- field: query
6367
type: domain
68+
- field: signature
69+
type: signature
6470
tags:
6571
analytic_story:
6672
- Insider Threat
6773
- Command And Control
6874
- Ransomware
6975
- CISA AA24-241A
76+
- Remote Monitoring and Management Software
7077
asset_type: Endpoint
7178
mitre_attack_id:
7279
- T1219

detections/network/detect_remote_access_software_usage_traffic.yml

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage Traffic
22
id: 885ea672-07ee-475a-879e-60d28aa5dd42
3-
version: 5
3+
version: 6
44
date: '2024-11-15'
55
author: Steven Dick
66
status: production
@@ -52,19 +52,29 @@ drilldown_searches:
5252
| `security_content_ctime(lastTime)`'
5353
earliest_offset: $info_min_time$
5454
latest_offset: $info_max_time$
55+
- name: Investigate application traffic for $app$
56+
search: '| from datamodel:Network_Traffic.All_Traffic | search src=$src$ app=$app$'
57+
earliest_offset: $info_min_time$
58+
latest_offset: $info_max_time$
5559
rba:
5660
message: Application traffic for a known remote access software [$signature$] was
5761
detected from $src$.
5862
risk_objects:
5963
- field: src
6064
type: system
6165
score: 25
62-
threat_objects: []
66+
- field: user
67+
type: user
68+
score: 25
69+
threat_objects:
70+
- field: signature
71+
type: signature
6372
tags:
6473
analytic_story:
6574
- Insider Threat
6675
- Command And Control
6776
- Ransomware
77+
- Remote Monitoring and Management Software
6878
asset_type: Network
6979
mitre_attack_id:
7080
- T1219

detections/web/detect_remote_access_software_usage_url.yml

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect Remote Access Software Usage URL
22
id: 9296f515-073c-43a5-88ec-eda5a4626654
3-
version: 6
3+
version: 7
44
date: '2024-11-15'
55
author: Steven Dick
66
status: production
@@ -52,6 +52,10 @@ drilldown_searches:
5252
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
5353
earliest_offset: $info_min_time$
5454
latest_offset: $info_max_time$
55+
- name: Investigate traffic to $url_domain$
56+
search: '| from datamodel:Web | search src=$src$ url_domain=$url_domain$'
57+
earliest_offset: $info_min_time$
58+
latest_offset: $info_max_time$
5559
rba:
5660
message: A domain for a known remote access software $url_domain$ was contacted
5761
by $src$.
@@ -65,12 +69,15 @@ rba:
6569
threat_objects:
6670
- field: url_domain
6771
type: domain
72+
- field: signature
73+
type: signature
6874
tags:
6975
analytic_story:
7076
- Insider Threat
7177
- Command And Control
7278
- Ransomware
7379
- CISA AA24-241A
80+
- Remote Monitoring and Management Software
7481
asset_type: Network
7582
mitre_attack_id:
7683
- T1219
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: Remote Monitoring and Management Software
2+
id: e405907a-273c-41c9-928c-768c9355c1f7
3+
version: 1
4+
date: '2025-01-14'
5+
author: Steven Dick
6+
status: production
7+
description: |-
8+
Fortify your remote access and unapproved software monitoring with searches that monitor for and help you investigate the use of unappoved or malicious remote monitoring and management softwares (RMM).
9+
narrative: |-
10+
Attackers can leverage a variety of 3rd party software to establish unapproved remote access or c2 channels to an enterprise network. Common techniques include the installation of these remote access software via channels via phishing, scam, or driveby malware compromise situations. While this Analytic Story is not a comprehensive listing of all RMM software it provides a useful starting point for well known indicators.
11+
12+
Be sure to leverage the "RMM Software Tracking" dashboard provided with this story for a convienent way to vizualize RMM usage in your enviroment.
13+
references:
14+
- https://attack.mitre.org/techniques/T1219/
15+
- https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/
16+
- https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/
17+
tags:
18+
category:
19+
- Malware
20+
- Adversary Tactics
21+
product:
22+
- Splunk Enterprise
23+
- Splunk Enterprise Security
24+
- Splunk Cloud
25+
usecase: Security Monitoring

0 commit comments

Comments
 (0)