heroui logo

Suspicious RASdial Activity

Sigma Rules

View Source
Summary
The rule titled "Suspicious RASdial Activity" is designed to detect unusual or suspicious behavior associated with the execution of 'rasdial.exe', a legitimate Windows tool typically used for setting up Remote Access Service connections. The detection focuses on monitoring process creation activities where the image name ends with 'rasdial.exe'. The potential for misuse of this tool is high as it can be leveraged by attackers to establish unauthorized remote access or to execute other malicious scripts under the guise of legitimate connectivity. The rule operates within the Windows environment, requiring the analysis of process creation logs to effectively capture instances where 'rasdial.exe' is executed. It emphasizes the importance of contextual analysis, as legitimate usage of this tool may occur in administrative tasks. The rule has a medium severity level and could yield false positives based on the context of scripts and administrative tools present in the operational environment.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2019-01-16