075. Detecting RMMs from Ransomware Affiliate's Toolkit: ConnectWise
Hello everyone! I want to continue sharing information on RMMs abused by various ransomware affiliates and other threat actors. And look at detection opportunities, of course! Today we'll look at another popular RAT - ConnectWise.
If you want a fresh example of ConnectWise abuse - here you go. So, let's look at this report from detection perspective. First of all, the malicious file runs msiexec.exe to install ConnectWise:
msiexec.exe" /i "C:\Users\<USER>\AppData\Local\Temp\ScreenConnect\24.3.7.9067\797046ee258ccec1\ScreenConnect.ClientSetup.msi"
Let's search for msiexec.exe executions with "ScreenConnect" in the target path:
event_type: "processcreatewin"
AND
proc_file_name: "msiexec.exe"
AND
cmdline: "ScreenConnect"
So, the adversary uses a legitimate ConnectWise client, so we can also hunt for it as well (or detect if you don't use it in your environment):
event_type: "processcreatewin"
AND
proc_file_productname: "ScreenConnect"
If you want, you can use other parts of metadata to build detection, for example, file's original name.
See you tomorrow!
Comments
Post a Comment