heroui logo

Potential SharpRDP Behavior

Elastic Detection Rules

View Source
Summary
The rule "Potential SharpRDP Behavior" is designed to identify malicious activities associated with the SharpRDP tool, which can enable attackers to execute commands on remote systems through the Remote Desktop Protocol (RDP). This detection rule leverages event queries to track specific behaviors indicative of lateral movement within a network. It is targeted primarily at Windows environments and utilizes a sequence of events that includes incoming RDP connections, registry changes related to the RunMRU (Most Recently Used) list, and subsequent process executions in close temporal proximity. The rule operates by monitoring event logs across network, process, and registry categories, looking for specific patterns that suggest unauthorized command execution through RDP. The risk score for this rule is set at 73, indicating a high level of concern. The rule also provides investigation guidelines, advising analysts on how to correlate logs and investigate potential threats, emphasizing the importance of contextual awareness to reduce false positives. The underlying premise is to safeguard against malicious exploitation of RDP for lateral movement within an organization's infrastructure.
Categories
  • Endpoint
  • Windows
Data Sources
  • Network Traffic
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1021
  • T1021.001
Created: 2020-11-11