Remote Desktop Process Running On System

Description

This search looks for the remote desktop process mstsc.exe running on systems upon which it doesn't typically run. This is accomplished by filtering out all systems that are noted in the common_rdp_source category in the Assets and Identity framework.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Advanced Threat Detection

Category

Lateral Movement

Alert Volume

This search looks for the remote desktop process mstsc.exe running on systems upon which it doesn't typically run. This is accomplished by filtering out all systems that are noted in the `common_rdp_source category` in the Assets and Identity framework.

SPL Difficulty

None

Journey

Stage 3

MITRE ATT&CK Tactics

Lateral Movement

MITRE ATT&CK Techniques

Remote Services

Remote Desktop Protocol

MITRE Threat Groups

APT1
APT3
APT39
APT41
Axiom
Blue Mockingbird
Chimera
Cobalt Group
Dragonfly 2.0
FIN10
FIN6
FIN8
Lazarus Group
Leviathan
OilRig
Patchwork
Silence
Stolen Pencil
TEMP.Veles
Wizard Spider
menuPass

Kill Chain Phases

Actions On Objectives

Data Sources

Endpoint Detection and Response

   Help

Remote Desktop Process Running On System Help

To successfully implement this search, you must be ingesting data that records process activity from your hosts to populate the endpoint data model in the processes node. The search requires you to identify systems that do not commonly use remote desktop. You can use the included support search "Identify Systems Using Remote Desktop" to identify these systems. After identifying them, you will need to add the "commonrdpsource" category to that system using the Enterprise Security Assets and Identities framework. This can be done by adding an entry in the assets.csv file located in SA-IdentityManagement/lookups.

   Search

Open in Search