075. Detecting RMMs from Ransomware Affiliate's Toolkit: ConnectWise

Hello everyone! I want to continue sharing information on RMMs abused by various ransomware affiliates and other threat actors. And look at detection opportunities, of course! Today we'll look at another popular RAT - ConnectWise.

If you want a fresh example of ConnectWise abuse - here you go. So, let's look at this report from detection perspective. First of all, the malicious file runs msiexec.exe to install ConnectWise:

msiexec.exe" /i "C:\Users\<USER>\AppData\Local\Temp\ScreenConnect\24.3.7.9067\797046ee258ccec1\ScreenConnect.ClientSetup.msi"

Let's search for msiexec.exe executions with "ScreenConnect" in the target path:

event_type: "processcreatewin"

AND

proc_file_name: "msiexec.exe"

AND

cmdline: "ScreenConnect"

So, the adversary uses a legitimate ConnectWise client, so we can also hunt for it as well (or detect if you don't use it in your environment):

event_type: "processcreatewin"

AND

proc_file_productname: "ScreenConnect"

If you want, you can use other parts of metadata to build detection, for example, file's original name.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge