Suspicious RASdial Activity
Detects suspicious process related to rasdial.exe
Sigma rule (View on GitHub)
1title: Suspicious RASdial Activity
2id: 6bba49bf-7f8c-47d6-a1bb-6b4dece4640e
3status: test
4description: Detects suspicious process related to rasdial.exe
5references:
6 - https://twitter.com/subTee/status/891298217907830785
7author: juju4
8date: 2019-01-16
9modified: 2021-11-27
10tags:
11 - attack.defense-evasion
12 - attack.execution
13 - attack.t1059
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 Image|endswith: 'rasdial.exe'
20 condition: selection
21falsepositives:
22 - False positives depend on scripts and administrative tools used in the monitored environment
23level: medium
References
Related rules
- Add Insecure Download Source To Winget
- Add New Download Source To Winget
- Install New Package Via Winget Local Manifest
- Payload Decoded and Decrypted via Built-in Utilities
- Potential Arbitrary Command Execution Via FTP.EXE