Spike in Number of Processes in an RDP Session
A machine learning job has detected an unusually high number of processes started within a single Remote Desktop Protocol (RDP) session, potentially indicating lateral movement activity.
This detection identifies potential lateral movement by flagging spikes in the number of processes initiated during a single RDP session. The rule, based on an Elastic machine learning job named lmd_high_sum_rdp_number_of_processes_ea, aims to uncover suspicious remote activity indicative of an attacker attempting to execute commands or deploy tools on a compromised host. This detection matters because RDP is a common vector for attackers to gain access to internal networks and subsequently move laterally. The detection leverages Windows RDP process events and file events collected by the Elastic Defend integration. Identifying anomalous process creation within RDP sessions can help defenders identify and respond to potential security incidents faster.
Attack Chain
- An attacker gains initial access to a system within the network.
- The attacker leverages valid credentials or exploits an RDP vulnerability to establish a remote session (T1021.001).
- Once connected via RDP, the attacker begins to execute a series of commands to enumerate the system and network.
- The attacker attempts to install malware or other malicious tools, triggering the creation of multiple processes.
- The machine learning job detects a significant increase in the number of processes started within the RDP session.
- The detection rule triggers, alerting analysts to the anomalous activity.
- The attacker uses the newly installed tools to move laterally to other systems on the network.
- The attacker achieves their objective, such as data exfiltration or ransomware deployment.
Impact
A successful lateral movement attack can lead to significant damage, including data breaches, system compromise, and financial loss. While the severity is low, a spike in RDP processes can be an early indicator of compromise. Attackers often use RDP to propagate through a network after gaining initial access, making this detection critical for preventing widespread damage.
Recommendation
- Enable host IP collection by following the configuration steps in the Elastic Defend documentation to ensure the
host.ipfield is populated. - Install the Lateral Movement Detection integration assets as described in the rule’s setup instructions to enable the machine learning job
lmd_high_sum_rdp_number_of_processes_ea. - Review and tune the anomaly threshold to reduce false positives based on your organization’s typical RDP usage.
- Investigate RDP sessions flagged by this rule to identify the source of the process spike and potential malicious activity as described in the rule’s “Triage and Analysis” notes.
Detection coverage 2
Detect High Number of Processes Created by a Single User via RDP
mediumDetects a high number of process creations by a single user within a short timeframe during an RDP session, indicating possible lateral movement.
Detect RDP Session with Suspicious Process Name
mediumDetects a suspicious process being created during an RDP session. This may indicate lateral movement activity.
Detection queries are kept inside the platform. Get full rules →