Skip to content

Commit cbb282b

Browse files
committed
removing allowed contraint and new name
1 parent 7feac89 commit cbb282b

File tree

2 files changed

+71
-0
lines changed

2 files changed

+71
-0
lines changed
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
name: Remote Desktop Network Bruteforce
2+
id: a98727cc-286b-4ff2-b898-41df64695923
3+
version: 6
4+
date: '2025-01-10'
5+
author: Jose Hernandez, Bhavin Patel, Splunk
6+
status: deprecated
7+
type: TTP
8+
description: The following analytic identifies potential Remote Desktop Protocol (RDP) brute force attacks by monitoring network traffic for RDP application activity. This query detects potential RDP brute force attacks by identifying source IPs that have made more than 10 successful connection attempts to the same RDP port on a host within a one-hour window. The results are presented in a table that includes the source and destination IPs, destination port, number of attempts, and the times of the first and last connection attempts, helping to prioritize IPs based on the intensity of activity.
9+
data_source:
10+
- Sysmon EventID 3
11+
search: >-
12+
| tstats `security_content_summariesonly` count, min(_time) as firstTime, max(_time) as lastTime from datamodel=Network_Traffic where (All_Traffic.app=rdp OR All_Traffic.dest_port=3389) AND All_Traffic.action=allowed by All_Traffic.src, All_Traffic.dest, All_Traffic.dest_port All_Traffic.user All_Traffic.vendor_product
13+
| `drop_dm_object_name("All_Traffic")`
14+
| eval duration=lastTime-firstTime
15+
| where count > 10 AND duration < 3600
16+
| `security_content_ctime(firstTime)`
17+
| `security_content_ctime(lastTime)`
18+
| `remote_desktop_network_bruteforce_filter`
19+
how_to_implement: You must ensure that your network traffic data is populating the Network_Traffic data model. Adjust the count and duration thresholds as necessary to tune the sensitivity of your detection.
20+
known_false_positives: RDP gateways may have unusually high amounts of traffic from all other hosts' RDP applications in the network.Any legitimate RDP traffic using wrong/expired credentials will be also detected as a false positive.
21+
references:
22+
- https://www.zscaler.com/blogs/security-research/ransomware-delivered-using-rdp-brute-force-attack
23+
- https://www.reliaquest.com/blog/rdp-brute-force-attacks/
24+
drilldown_searches:
25+
- name: View the detection results for - "$dest$"
26+
search: '%original_detection_search% | search dest = "$dest$"'
27+
earliest_offset: $info_min_time$
28+
latest_offset: $info_max_time$
29+
- name: View risk events for the last 7 days for - "$dest$"
30+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
31+
earliest_offset: $info_min_time$
32+
latest_offset: $info_max_time$
33+
tags:
34+
analytic_story:
35+
- SamSam Ransomware
36+
- Ryuk Ransomware
37+
- Compromised User Account
38+
asset_type: Endpoint
39+
confidence: 50
40+
impact: 50
41+
message: $dest$ may be the target of an RDP Bruteforce from $src$
42+
mitre_attack_id:
43+
- T1110.001
44+
- T1110
45+
observable:
46+
- name: dest
47+
type: Hostname
48+
role:
49+
- Victim
50+
- name: src
51+
type: IP Address
52+
role:
53+
- Attacker
54+
product:
55+
- Splunk Enterprise
56+
- Splunk Enterprise Security
57+
- Splunk Cloud
58+
required_fields:
59+
- _time
60+
- All_Traffic.app
61+
- All_Traffic.src
62+
- All_Traffic.dest
63+
- All_Traffic.dest_port
64+
risk_score: 25
65+
security_domain: network
66+
tests:
67+
- name: True Positive Test
68+
attack_data:
69+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1110.001/rdp_brute_sysmon/sysmon.log
70+
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
71+
sourcetype: XmlWinEventLog
File renamed without changes.

0 commit comments

Comments
 (0)