Remote Thread Creation In Mstsc.Exe From Suspicious Location

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects remote thread creation in the "mstsc.exe" process by a process located in a potentially suspicious location. This technique is often used by attackers in order to hook some APIs used by DLLs loaded by "mstsc.exe" during RDP authentications in order to steal credentials.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "sa_create_remote_thread" AND PROCESSNAME endswith "\mstsc.exe" AND PARENTPROCESSNAME contains ":\Temp\,:\Users\Public\,:\Windows\PerfLogs\,:\Windows\Tasks\,:\Windows\Temp\,\AppData\Local\Temp" select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Nasreddine Bencherchali (Nextron Systems)