heroui logo

Remote Thread Creation In Mstsc.Exe From Suspicious Location

Sigma Rules

View Source
Summary
This detection rule identifies instances of remote thread creation in the 'mstsc.exe' process originating from potentially suspicious file paths. The threat is pertinent as attackers commonly exploit this technique to inject malicious code into the Remote Desktop Connection (RDP) session, allowing them to hook APIs used by DLLs during authentication processes to compromise user credentials. Such actions pose a severe security risk, especially in environments relying heavily on RDP for remote management. The specific suspicious locations monitored by this rule include default temporary directories and others known to harbor unauthorized scripts or binaries. The rule is stringent, targeting only those instances where 'mstsc.exe' is influenced by potentially hazardous sources, thereby minimizing false positives and increasing the probability of accurate threat identification.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • File
Created: 2023-07-28