EXPLORE
← Back to Explore
sigmamediumHunting

Potential RDP Session Hijacking Activity

Detects potential RDP Session Hijacking activity on Windows systems

Detection Query

selection_img:
  - Image|endswith: \tscon.exe
  - OriginalFileName: tscon.exe
selection_integrity:
  IntegrityLevel:
    - System
    - S-1-16-16384
condition: all of selection_*

Author

@juju4

Created

2022-12-27

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.execution
Raw Content
title: Potential RDP Session Hijacking Activity
id: 224f140f-3553-4cd1-af78-13d81bf9f7cc
status: test
description: Detects potential RDP Session Hijacking activity on Windows systems
references:
    - https://twitter.com/Moti_B/status/909449115477659651
author: '@juju4'
date: 2022-12-27
modified: 2024-12-01
tags:
    - attack.execution
logsource:
    category: process_creation
    product: windows
detection:
    selection_img:
        - Image|endswith: '\tscon.exe'
        - OriginalFileName: 'tscon.exe'
    selection_integrity:
        IntegrityLevel:
            - 'System'
            - 'S-1-16-16384'
    condition: all of selection_*
falsepositives:
    - Administrative activity
level: medium