Suspicious RASdial Activity
Detects suspicious process related to rasdial.exe
Sigma rule (View on GitHub)
1title: Suspicious RASdial Activity
2id: 6bba49bf-7f8c-47d6-a1bb-6b4dece4640e
3status: test
4description: Detects suspicious process related to rasdial.exe
5references:
6 - https://twitter.com/subTee/status/891298217907830785
7author: juju4
8date: 2019/01/16
9modified: 2021/11/27
10tags:
11 - attack.defense_evasion
12 - attack.execution
13 - attack.t1059
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 Image|endswith: 'rasdial.exe'
20 condition: selection
21falsepositives:
22 - False positives depend on scripts and administrative tools used in the monitored environment
23level: medium
References
Related rules
- Suspicious Runscripthelper.exe
- Renamed FTP.EXE Execution
- Run PowerShell Script from Redirected Input Stream
- Detection of PowerShell Execution via Sqlps.exe
- Invoke-Obfuscation Obfuscated IEX Invocation