-
-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Create proc_creation_win_tacticalrmm_install_via_cli.yml #5442
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
rules/windows/process_creation/proc_creation_win_tacticalrmm_install_via_cli.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_tacticalrmm_install_via_cli.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_tacticalrmm_install_via_cli.yml
Outdated
Show resolved
Hide resolved
rules/windows/process_creation/proc_creation_win_tacticalrmm_install_via_cli.yml
Outdated
Show resolved
Hide resolved
…nstall_via_cli.yml Co-authored-by: phantinuss <[email protected]>
…nstall_via_cli.yml Co-authored-by: phantinuss <[email protected]>
…o proc_creation_win_remote_access_tools_tacticalrmm_installation_via_cli.yml
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Based on my research, I found that this method is not used for soleley silent installation. For Silent installs, there is a complete diif approach which use complete other flag, for example:
tacticalagent-v2.9.1-windows-amd64.exe /VERYSILENT /SUPPRESSMSGBOXES
These -api, --auth, and related flags configure the agent to connect to a specific RMM server with authentication, client ID, and site ID. This could be an attempt by a threat actor to connect the agent to an attacker-controlled server.
Relevant resource: https://www.virustotal.com/gui/file/760855ddeef6b05ef377067d8e4dd05351b8a051e4cd0d85bb016f4ecd1289fd/behavior.
I think we can modify the rule to give clear description on watch it's supposed to detect and maybe add another rule for silent installation.
Let me know if my findings are incorrect or I misunderstood you.
Thank you for the insightful feedback, @swachchhanda000. Upon reviewing the official TacticalRMM documentation, it's evident that the agent installation process supports command-line parameters for automated deployments. Specifically, the documentation outlines methods for scripting agent installations, which utilize command-line flags such as --api, --auth, and --client-id. These methods are designed for automated deployments without user interaction, fitting the definition of silent installations. Reference: TacticalRMM Agent Installation Guide Given this, the use of these command-line flags aligns with silent installation practices, especially in automated or large-scale deployment scenarios. Therefore, the proposed Sigma rule targeting these patterns is justified for detecting such installations. |
Summary of the Pull Request
This pull request introduces a new Sigma rule titled "TacticalRMM Agent Installation via Command Line", which detects the silent deployment of TacticalRMM using specific command-line flags such as
--api
,--auth
,--client-id
This pattern is often seen in post-exploitation tool deployments and stealth persistence scenarios. The rule also validates the binary path
\TacticalAgent\tacticalrmm.exe
to improve detection confidence.Changelog
new: TacticalRMM Agent Installation via Command Line
Example Log Event