Disabled RestrictedAdminMode For RDS
Detect activation of DisableRestrictedAdmin to disable RestrictedAdmin mode. RestrictedAdmin mode prevents the transmission of reusable credentials to the remote system to which you connect using Remote Desktop. This prevents your credentials from being harvested during the initial connection process if the remote server has been compromise
Sigma rule (View on GitHub)
1title: Disabled RestrictedAdminMode For RDS
2id: d6ce7ebd-260b-4323-9768-a9631c8d4db2
3related:
4 - id: 28ac00d6-22d9-4a3c-927f-bbd770104573 # process_creation
5 type: similar
6status: experimental
7description: |
8 Detect activation of DisableRestrictedAdmin to disable RestrictedAdmin mode.
9 RestrictedAdmin mode prevents the transmission of reusable credentials to the remote system to which you connect using Remote Desktop.
10 This prevents your credentials from being harvested during the initial connection process if the remote server has been compromise
11references:
12 - https://github.com/redcanaryco/atomic-red-team/blob/a8e3cf63e97b973a25903d3df9fd55da6252e564/atomics/T1112/T1112.md
13 - https://social.technet.microsoft.com/wiki/contents/articles/32905.remote-desktop-services-enable-restricted-admin-mode.aspx
14author: frack113
15date: 2023/01/13
16modified: 2023/08/17
17tags:
18 - attack.defense_evasion
19 - attack.t1112
20logsource:
21 product: windows
22 category: registry_set
23detection:
24 selection:
25 TargetObject|endswith: 'System\CurrentControlSet\Control\Lsa\DisableRestrictedAdmin'
26 Details: 'DWORD (0x00000001)'
27 condition: selection
28falsepositives:
29 - Unknown
30level: high
References
Related rules
- Access To .Reg/.Hive Files By Uncommon Application
- Potential Persistence Via Custom Protocol Handler
- RDP Sensitive Settings Changed
- Imports Registry Key From a File
- Imports Registry Key From an ADS