heroui logo

Terminal Service Process Spawn

Sigma Rules

View Source
Summary
This detection rule identifies instances where a process is spawned by the terminal service server process (termsvcs) on Windows systems. It specifically checks for processes initiated by 'svchost.exe' that could indicate exploitation of the critical Remote Desktop Protocol (RDP) vulnerability identified as CVE-2019-0708. This vulnerability allows unauthorized remote access and has a high risk factor, making it crucial to monitor for such anomalies. The rule employs a selection criteria that filters processes based on their parent command line, while actively excluding known benign processes like 'rdpclip.exe', 'csrss.exe', 'wininit.exe', and 'winlogon.exe'. If a process meets the selection criteria but corresponds to none of the exclusions, it triggers an alert for further investigation.
Categories
  • Windows
Data Sources
  • Process
Created: 2019-05-22