Skip to content

Commit

Permalink
Merge pull request #3312 from nterl0k/nterl0k-rmm-story-update-1
Browse files Browse the repository at this point in the history
Nterl0k - RMM Story and Detection Update, Again
  • Loading branch information
patel-bhavin authored Feb 6, 2025
2 parents 93f33cc + 9658514 commit 3eaad9a
Show file tree
Hide file tree
Showing 8 changed files with 83 additions and 9 deletions.
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Detect Remote Access Software Usage File
id: 3bf5541a-6a45-4fdc-b01d-59b899fff961
version: 5
version: 6
date: '2024-11-13'
author: Steven Dick
status: production
Expand Down Expand Up @@ -54,6 +54,10 @@ drilldown_searches:
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
- name: Investigate files on $dest$
search: '| from datamodel:Endpoint.Filesystem | search dest=$dest$ file_name=$file_name$'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
rba:
message: A file for known a remote access software [$file_name$] was created on
$dest$ by $user$.
Expand All @@ -67,13 +71,16 @@ rba:
threat_objects:
- field: file_name
type: file_name
- field: signature
type: signature
tags:
analytic_story:
- Insider Threat
- Command And Control
- Ransomware
- Gozi Malware
- CISA AA24-241A
- Remote Monitoring and Management Software
asset_type: Endpoint
mitre_attack_id:
- T1219
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Detect Remote Access Software Usage FileInfo
id: ccad96d7-a48c-4f13-8b9c-9f6a31cba454
version: 5
version: 6
date: '2024-11-13'
author: Steven Dick
status: production
Expand Down Expand Up @@ -47,22 +47,32 @@ drilldown_searches:
| `security_content_ctime(lastTime)`'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
- name: Investigate processes on $dest$
search: '| from datamodel:Endpoint.Processes| search dest=$dest$ process_name=$process_name$'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
rba:
message: A file attributes for known a remote access software [$process_name$] was
detected on $dest$
risk_objects:
- field: dest
type: system
score: 25
- field: user
type: user
score: 25
threat_objects:
- field: process_name
type: process_name
- field: signature
type: signature
tags:
analytic_story:
- Insider Threat
- Command And Control
- Ransomware
- Gozi Malware
- Remote Monitoring and Management Software
asset_type: Endpoint
mitre_attack_id:
- T1219
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Detect Remote Access Software Usage Process
id: ffd5e001-2e34-48f4-97a2-26dc4bb08178
version: 5
version: 6
date: '2024-11-13'
author: Steven Dick
status: production
Expand Down Expand Up @@ -59,6 +59,10 @@ drilldown_searches:
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
- name: Investigate processes on $dest$
search: '| from datamodel:Endpoint.Processes| search dest=$dest$ process_name=$process_name$'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
rba:
message: A process for a known remote access software $process_name$ was identified
on $dest$.
Expand All @@ -72,13 +76,16 @@ rba:
threat_objects:
- field: process_name
type: process_name
- field: signature
type: signature
tags:
analytic_story:
- Insider Threat
- Command And Control
- Ransomware
- Gozi Malware
- CISA AA24-241A
- Remote Monitoring and Management Software
asset_type: Endpoint
mitre_attack_id:
- T1219
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Detect Remote Access Software Usage Registry
id: 33804986-25dd-43cf-bb6b-dc14956c7cbc
version: 2
version: 3
date: '2025-01-10'
author: Steven Dick
status: production
Expand Down Expand Up @@ -60,6 +60,7 @@ tags:
- Ransomware
- Gozi Malware
- CISA AA24-241A
- Remote Monitoring and Management Software
asset_type: Endpoint
mitre_attack_id:
- T1219
Expand Down
11 changes: 9 additions & 2 deletions detections/network/detect_remote_access_software_usage_dns.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Detect Remote Access Software Usage DNS
id: a16b797d-e309-41bd-8ba0-5067dae2e4be
version: 5
version: 6
date: '2024-11-15'
author: Steven Dick
status: production
Expand Down Expand Up @@ -52,21 +52,28 @@ drilldown_searches:
| `security_content_ctime(lastTime)`'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
- name: Investigate traffic to $query$
search: '| from datamodel:Network_Resolution.DNS | search src=$src$ query=$query$'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
rba:
message: A domain for a known remote access software $query$ was contacted by $src$.
risk_objects:
- field: src
type: system
score: 4
score: 25
threat_objects:
- field: query
type: domain
- field: signature
type: signature
tags:
analytic_story:
- Insider Threat
- Command And Control
- Ransomware
- CISA AA24-241A
- Remote Monitoring and Management Software
asset_type: Endpoint
mitre_attack_id:
- T1219
Expand Down
14 changes: 12 additions & 2 deletions detections/network/detect_remote_access_software_usage_traffic.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Detect Remote Access Software Usage Traffic
id: 885ea672-07ee-475a-879e-60d28aa5dd42
version: 5
version: 6
date: '2024-11-15'
author: Steven Dick
status: production
Expand Down Expand Up @@ -52,19 +52,29 @@ drilldown_searches:
| `security_content_ctime(lastTime)`'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
- name: Investigate application traffic for $app$
search: '| from datamodel:Network_Traffic.All_Traffic | search src=$src$ app=$app$'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
rba:
message: Application traffic for a known remote access software [$signature$] was
detected from $src$.
risk_objects:
- field: src
type: system
score: 25
threat_objects: []
- field: user
type: user
score: 25
threat_objects:
- field: signature
type: signature
tags:
analytic_story:
- Insider Threat
- Command And Control
- Ransomware
- Remote Monitoring and Management Software
asset_type: Network
mitre_attack_id:
- T1219
Expand Down
9 changes: 8 additions & 1 deletion detections/web/detect_remote_access_software_usage_url.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Detect Remote Access Software Usage URL
id: 9296f515-073c-43a5-88ec-eda5a4626654
version: 6
version: 7
date: '2024-11-15'
author: Steven Dick
status: production
Expand Down Expand Up @@ -52,6 +52,10 @@ drilldown_searches:
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
- name: Investigate traffic to $url_domain$
search: '| from datamodel:Web | search src=$src$ url_domain=$url_domain$'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
rba:
message: A domain for a known remote access software $url_domain$ was contacted
by $src$.
Expand All @@ -65,12 +69,15 @@ rba:
threat_objects:
- field: url_domain
type: domain
- field: signature
type: signature
tags:
analytic_story:
- Insider Threat
- Command And Control
- Ransomware
- CISA AA24-241A
- Remote Monitoring and Management Software
asset_type: Network
mitre_attack_id:
- T1219
Expand Down
25 changes: 25 additions & 0 deletions stories/remote_monitoring_and_management_software.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
name: Remote Monitoring and Management Software
id: e405907a-273c-41c9-928c-768c9355c1f7
version: 1
date: '2025-01-14'
author: Steven Dick
status: production
description: |-
Fortify your remote access and unapproved software monitoring with searches that monitor for and help you investigate the use of unappoved or malicious remote monitoring and management softwares (RMM).
narrative: |-
Attackers can leverage a variety of 3rd party software to establish unapproved remote access or c2 channels to an enterprise network. Common techniques include the installation of these remote access software via channels via phishing, scam, or driveby malware compromise situations. While this Analytic Story is not a comprehensive listing of all RMM software it provides a useful starting point for well known indicators.
Be sure to leverage the "RMM Software Tracking" dashboard provided with this story for a convienent way to vizualize RMM usage in your enviroment.
references:
- https://attack.mitre.org/techniques/T1219/
- https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/
- https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/
tags:
category:
- Malware
- Adversary Tactics
product:
- Splunk Enterprise
- Splunk Enterprise Security
- Splunk Cloud
usecase: Security Monitoring

0 comments on commit 3eaad9a

Please sign in to comment.