forked from SigmaHQ/sigma
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge PR SigmaHQ#5020 from @tsale - Add `Remote Access Tool - MeshAge…
…nt Command Execution via MeshCentral` new: Remote Access Tool - MeshAgent Command Execution via MeshCentral --------- Co-authored-by: frack113 <[email protected]> Co-authored-by: nasbench <[email protected]>
- Loading branch information
1 parent
9db7e07
commit 014d169
Showing
1 changed file
with
29 additions
and
0 deletions.
There are no files selected for viewing
29 changes: 29 additions & 0 deletions
29
rules/windows/process_creation/proc_creation_win_remote_access_tools_meshagent_exec.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
title: Remote Access Tool - MeshAgent Command Execution via MeshCentral | ||
id: 74a2b202-73e0-4693-9a3a-9d36146d0775 | ||
status: experimental | ||
description: | | ||
Detects the use of MeshAgent to execute commands on the target host, particularly when threat actors might abuse it to execute commands directly. | ||
MeshAgent can execute commands on the target host by leveraging win-console to obscure their activities and win-dispatcher to run malicious code through IPC with child processes. | ||
references: | ||
- https://github.com/Ylianst/MeshAgent | ||
- https://github.com/Ylianst/MeshAgent/blob/52cf129ca43d64743181fbaf940e0b4ddb542a37/modules/win-dispatcher.js#L173 | ||
- https://github.com/Ylianst/MeshAgent/blob/52cf129ca43d64743181fbaf940e0b4ddb542a37/modules/win-info.js#L55 | ||
author: '@Kostastsale' | ||
date: 2024-09-22 | ||
tags: | ||
- attack.command-and-control | ||
- attack.t1219 | ||
logsource: | ||
product: windows | ||
category: process_creation | ||
detection: | ||
selection: | ||
ParentImage|endswith: '\meshagent.exe' | ||
Image|endswith: | ||
- '\cmd.exe' | ||
- '\powershell.exe' | ||
- '\pwsh.exe' | ||
condition: selection | ||
falsepositives: | ||
- False positives can be found in environments using MessAgent for remote management, analysis should prioritize the grandparent process, MessAgent.exe, and scrutinize the resulting child processes triggered by any suspicious interactive commands directed at the target host. | ||
level: medium |