Skip to content

Create proc_creation_win_tacticalrmm_install_via_cli.yml #5442

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 13 commits into
base: master
Choose a base branch
from

Conversation

egycondor
Copy link
Contributor

@egycondor egycondor commented May 29, 2025

Summary of the Pull Request

This pull request introduces a new Sigma rule titled "TacticalRMM Agent Installation via Command Line", which detects the silent deployment of TacticalRMM using specific command-line flags such as --api, --auth, --client-id
This pattern is often seen in post-exploitation tool deployments and stealth persistence scenarios. The rule also validates the binary path \TacticalAgent\tacticalrmm.exe to improve detection confidence.

Changelog

new: TacticalRMM Agent Installation via Command Line

Example Log Event

{
  "EventID": 1,
  "UtcTime": "2025-05-29T11:23:15.112Z",
  "Image": "C:\\Program Files\\TacticalAgent\\tacticalrmm.exe",
  "CommandLine": "\"C:\\Program Files\\TacticalAgent\\tacticalrmm.exe\" -m install --api https://api.example.com --client-id 1 --site-id 1 --agent-type workstation --auth d5177b5bbdc[REDACTED]be62a0e83 -rdp -ping",
  "OriginalFileName": "tacticalrmm.exe",
  "ParentImage": "C:\\Users\\user\\Desktop\\trmm-client1-site1-workstation-amd64.exe",
  "ParentCommandLine": "\"C:\\Users\\user\\Desktop\\trmm-client1-site1-workstation-amd64.exe\"",
  "User": "WIN10-TH-VM\\user",
  "Company": "AmidaWare Inc",
  "Product": "Tactical RMM Agent",
  "FileVersion": "v2.9.1.0",
  "Hashes": "SHA256=EE33AAA05BE135969D86452A49A8E50A5313EFDFC46AE2E7FC8A9AF33556046C"
}

@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels May 29, 2025
@egycondor egycondor requested a review from phantinuss June 2, 2025 14:03
@phantinuss phantinuss added the Author Input Required changes the require information from original author of the rules label Jun 4, 2025
…o proc_creation_win_remote_access_tools_tacticalrmm_installation_via_cli.yml
@nasbench nasbench added 2nd Review Needed PR need a second approval and removed Author Input Required changes the require information from original author of the rules labels Jun 4, 2025
@nasbench nasbench requested review from phantinuss and removed request for phantinuss June 4, 2025 13:03
Copy link
Contributor

@swachchhanda000 swachchhanda000 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Based on my research, I found that this method is not used for soleley silent installation. For Silent installs, there is a complete diif approach which use complete other flag, for example:

tacticalagent-v2.9.1-windows-amd64.exe /VERYSILENT /SUPPRESSMSGBOXES

These -api, --auth, and related flags configure the agent to connect to a specific RMM server with authentication, client ID, and site ID. This could be an attempt by a threat actor to connect the agent to an attacker-controlled server.

Relevant resource: https://www.virustotal.com/gui/file/760855ddeef6b05ef377067d8e4dd05351b8a051e4cd0d85bb016f4ecd1289fd/behavior.

I think we can modify the rule to give clear description on watch it's supposed to detect and maybe add another rule for silent installation.

Let me know if my findings are incorrect or I misunderstood you.

@egycondor
Copy link
Contributor Author

Thank you for the insightful feedback, @swachchhanda000.

Upon reviewing the official TacticalRMM documentation, it's evident that the agent installation process supports command-line parameters for automated deployments. Specifically, the documentation outlines methods for scripting agent installations, which utilize command-line flags such as --api, --auth, and --client-id. These methods are designed for automated deployments without user interaction, fitting the definition of silent installations.

Reference: TacticalRMM Agent Installation Guide

Given this, the use of these command-line flags aligns with silent installation practices, especially in automated or large-scale deployment scenarios. Therefore, the proposed Sigma rule targeting these patterns is justified for detecting such installations.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
2nd Review Needed PR need a second approval Rules Windows Pull request add/update windows related rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants