Potential Outgoing RDP Connection by Unusual Process

edit

Potential Outgoing RDP Connection by Unusual Process

edit

Adversaries may attempt to connect to a remote system over Windows Remote Desktop Protocol (RDP) to achieve lateral movement. Adversaries may avoid using the Microsoft Terminal Services Client (mstsc.exe) binary to establish an RDP connection to evade detection.

Rule type: eql

Rule indices:

  • logs-endpoint.events.*

Severity: low

Risk score: 21

Runs every: 60m

Searches indices from: now-119m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

References: None

Tags:

  • Domain: Endpoint
  • OS: Windows
  • Use Case: Threat Detection
  • Tactic: Lateral Movement
  • Data Source: Elastic Defend

Version: 1

Rule authors:

  • Elastic

Rule license: Elastic License v2

Rule query

edit
network where host.os.type == "windows" and
  event.action == "connection_attempted" and destination.port == 3389 and
  not process.executable : "?:\\Windows\\System32\\mstsc.exe" and
  destination.ip != "::1" and destination.ip != "127.0.0.1"

Framework: MITRE ATT&CKTM