
Summary
This rule is designed to detect potentially malicious activity involving the execution of RDP files in Windows environments. Specifically, it analyzes events logged by Sysmon and Windows Event Logs, particularly focusing on instances where a Windows RDP client attempts to execute an RDP file from directories such as temporary folders, downloads, and Outlook directories. This behavior is often exploited by adversaries to deliver RDP files that can facilitate unauthorized access or data exfiltration. The detection utilizes Splunk's Search Processing Language (SPL) to extract relevant events and classify them based on their context and associated risk levels. The rule categorizes executions into various types (e.g., 'temp_archive_execution', 'downloads_execution') and assigns a risk score and reason based on the execution environment, thus helping security teams identify potentially harmful activities in a centralized manner.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Application Log
ATT&CK Techniques
- T1598.002
- T1021.001
Created: 2025-01-21