Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update access_remote_pc.yaml #35

Open
wants to merge 15 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 0 additions & 1 deletion detections/sigma/atera_processes_sigma.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@ detection:
- '*\AgentPackageTaskScheduler.exe'
- '*\AteraAgent.exe'
- atera_agent.exe
- atera_agent.exe
- ateraagent.exe
- syncrosetup.exe
condition: selection
Expand Down
21 changes: 0 additions & 21 deletions detections/sigma/aweray__awesun__processes_sigma.yml

This file was deleted.

1 change: 0 additions & 1 deletion detections/sigma/dw_service_processes_sigma.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@ detection:
ParentImage|endswith:
- dwagsvc.exe
- dwagent.exe
- dwagsvc.exe
condition: selection
id: 5652feeb-de11-4703-a3fb-1d43fc633ebc
status: experimental
Expand Down
20 changes: 0 additions & 20 deletions detections/sigma/fleetdeck_processes_sigma.yml

This file was deleted.

24 changes: 0 additions & 24 deletions detections/sigma/fleetdesk.io_processes_sigma.yml

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

20 changes: 0 additions & 20 deletions detections/sigma/royal_ts_processes_sigma.yml

This file was deleted.

20 changes: 0 additions & 20 deletions detections/sigma/splashtop_processes_sigma.yml

This file was deleted.

1 change: 0 additions & 1 deletion detections/sigma/tactical_rmm_processes_sigma.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@ detection:
selection:
ParentImage|endswith:
- tacticalrmm.exe
- tacticalrmm.exe
condition: selection
id: 58f7ad72-6d1a-46b6-b998-4a984395f7d5
status: experimental
Expand Down
2 changes: 0 additions & 2 deletions detections/sigma/ultraviewer_processes_sigma.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,6 @@ detection:
- '*\UltraViewer_Desktop.exe'
- ultraviewer_desktop.exe
- ultraviewer_service.exe
- UltraViewer_Desktop.exe
- UltraViewer_Service.exe
condition: selection
id: 71b5a484-76c9-4341-9267-f4b7eb8fd8a3
status: experimental
Expand Down
66 changes: 52 additions & 14 deletions yaml/access_remote_pc.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,29 +3,67 @@ Description: Access Remote PC is a remote monitoring and management (RMM) tool.
information will be added as it becomes available.
Author: ''
Created: ''
LastModified: 2/7/2024
LastModified: '2024-10-07'
Details:
Website: ''
Website: https://www.remotedesktop.com/
PEMetadata:
Filename: ''
OriginalFileName: ''
Description: ''
Privileges: ''
Free: ''
Verification: ''
SupportedOS: []
Filename:
OriginalFileName:
Description:
Privileges:
Free: true
Verification: true
SupportedOS:
- Windows
- Mac
- Linux
- Android
- iOS
Capabilities: []
Vulnerabilities: []
InstallationPaths:
- rpcgrab.exe
- rpcsetup.exe
- C:\Program Files (x86)\RemotePC\*
Artifacts:
Disk: []
EventLog: []
Disk:
- File: 'C:\Program Files (x86)\RemotePC\RemotePCUIU.exe'
Description: RemotePC service binary
OS: Windows
- File: C:\Program Files (x86)\RemotePC\*
Description: Multiple files and binaries related to RemotePC installation
OS: Windows
EventLog:
- EventID: 7045
ProviderName: Service Control Manager
LogFile: System.evtx
ServiceName: RemotePC Performance Service
ImagePath: '"C:\\Program Files (x86)\\RemotePC\\RemotePCPerformance\\RPCPerformanceService.exe"'
Description: Service installation event as result of RemotePC installation.
- EventID: 4688
ProviderName: Microsoft-Security-Auditing
LogFile: Security.evtx
CommandLine: sc create RPCService start=auto binpath="C:\\Program Files (x86)\\RemotePC\\RemotePCService.exe"
Description: Executing command to install RemotePC service.
- EventID: 4688
ProviderName: Microsoft-Security-Auditing
LogFile: Security.evtx
CommandLine: C:\\Windows\\system32\\schtasks /create /SC DAILY /st 12:00 /TN "RPCPerformanceHealthCheck" /TR "C:\\Program Files (x86)\\RemotePC\\RemotePCPerformance\\RPCPerformanceDownloader.exe" /rl HIGHEST /ru system
Description: Executing command to create RemotePC HealthCheck scheduled task.
- EventID: 4688
ProviderName: Microsoft-Security-Auditing
LogFile: Security.evtx
CommandLine: "C:\\Windows\\regedit.exe /s C:\\Program Files (x86)\\RemotePC\\Register.reg"
Description: Executing command to install various registry changes related to RemotePC.
- EventID: 4688
ProviderName: Microsoft-Security-Auditing
LogFile: Security.evtx
CommandLine: netsh advfirewall firewall add rule name="RemotePCDesktop" enable=yes dir=in action=allow profile=any program="C:\Program Files (x86)\RemotePC\RemotePCDesktop.exe" description="This program is used for File Transfer and is part of RemotePC product."
Description: Executing command to add local firewall rule to allow inbound traffic for RemotePC.
Registry: []
Network: []
Detections:
- Sigma: https://github.com/magicsword-io/LOLRMM/blob/main/detections/sigma/access_remote_pc_processes_sigma.yml
Description: Detects potential processes activity of Access Remote PC RMM tool
References: []
Acknowledgement: []
Acknowledgement:
- Person: Daniel Koifman
Handle: '@koifsec'