← Back to Explore
sigmamediumHunting
Potential RDP Session Hijacking Activity
Detects potential RDP Session Hijacking activity on Windows systems
Detection Query
selection_img:
- Image|endswith: \tscon.exe
- OriginalFileName: tscon.exe
selection_integrity:
IntegrityLevel:
- System
- S-1-16-16384
condition: all of selection_*
Author
@juju4
Created
2022-12-27
Data Sources
windowsProcess Creation Events
Platforms
windows
Tags
attack.execution
Raw Content
title: Potential RDP Session Hijacking Activity
id: 224f140f-3553-4cd1-af78-13d81bf9f7cc
status: test
description: Detects potential RDP Session Hijacking activity on Windows systems
references:
- https://twitter.com/Moti_B/status/909449115477659651
author: '@juju4'
date: 2022-12-27
modified: 2024-12-01
tags:
- attack.execution
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\tscon.exe'
- OriginalFileName: 'tscon.exe'
selection_integrity:
IntegrityLevel:
- 'System'
- 'S-1-16-16384'
condition: all of selection_*
falsepositives:
- Administrative activity
level: medium