LoFP LoFP / t1219.002

t1219.002

TitleTags
depending on the environment the rule might require some initial tuning before usage to avoid fp with third party applications
false positives can be found in environments using messagent for remote management, analysis should prioritize the grandparent process, messagent.exe, and scrutinize the resulting child processes triggered by any suspicious interactive commands directed at the target host.
host connections not using host fqdn.
host connections to external legitimate domains.
host connections to valid domains, exclude these.
if the script being executed make use of any of the utilities mentioned in the detection then they should filtered out or allowed.
legitimate activity of system administrators
legitimate atera agent installation
legitimate deployment of anydesk
legitimate incoming connections (e.g. sysadmin activity). most of the time i would expect outgoing connections (initiated locally).
legitimate piping of the password to anydesk
legitimate usage of the tool
legitimate use
legitimate use of anydesk from a non-standard folder
legitimate use of quick assist in the environment.
legitimate use of the tool
legitimate uses of teamviewer in an organisation
likelihood is related to how often the paths are used in the environment
likely with legitimate usage of \".rdp\" files
likely with other browser software. apply additional filters for any other browsers you might use.
some fp could occur with similar tools that uses the same command line '--set-password'
unknown binary names of teamviewer
unlikely