<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sharprdp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sharprdp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 17:46:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sharprdp/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential SharpRDP Behavior</title><link>https://feed.craftedsignal.io/briefs/2026-05-potential-sharprdp-behavior/</link><pubDate>Tue, 12 May 2026 17:46:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-potential-sharprdp-behavior/</guid><description>This rule detects potential SharpRDP behavior, a tool used for authenticated command execution against a remote target via Remote Desktop Protocol (RDP) for lateral movement by identifying incoming RDP connections followed by RunMRU registry value modifications and subsequent process execution.</description><content:encoded><![CDATA[<p>This detection rule identifies potential behavior associated with SharpRDP, a tool used to perform authenticated command execution against a remote target via Remote Desktop Protocol (RDP), often for lateral movement. The rule focuses on detecting incoming RDP connections to a Windows host, followed by the modification of the RunMRU registry key to include commands such as &ldquo;cmd.exe&rdquo;, &ldquo;powershell.exe&rdquo;, &ldquo;taskmgr.exe&rdquo;, or network paths like &ldquo;\tsclient*.exe&quot;. A subsequent process execution with a parent process matching one of these commands, within a short timeframe, raises suspicion. This behavior can indicate unauthorized remote command execution. This rule helps defenders identify potential lateral movement activities within their Windows environments. The references link to more information about SharpRDP and related techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker establishes an RDP connection to a target Windows system via <code>svchost.exe</code> on port 3389.</li>
<li>The attacker interacts with the system, potentially using the Run dialog (Win+R) or similar methods.</li>
<li><code>explorer.exe</code> modifies the <code>RunMRU</code> registry key, adding command strings like <code>cmd.exe</code>, <code>powershell.exe</code>, <code>taskmgr.exe</code>, or network paths like <code>\\\\tsclient\\*.exe</code>.</li>
<li>The attacker executes a command or script via one of the modified <code>RunMRU</code> entries.</li>
<li>A new process is spawned with a parent process like <code>cmd.exe</code>, <code>powershell.exe</code>, or <code>taskmgr.exe</code>, or executes a file from a mapped drive using the <code>\\\\tsclient\\*.exe</code> path.</li>
<li>The spawned process executes malicious code or performs lateral movement activities.</li>
<li>The attacker leverages the established RDP session for further reconnaissance or exploitation.</li>
<li>The ultimate objective is to gain unauthorized access to sensitive data or systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful SharpRDP attack can lead to unauthorized access to sensitive systems and data within the target network. Attackers can leverage the compromised system for lateral movement, escalating privileges, and deploying malware or ransomware. The severity of the impact depends on the attacker&rsquo;s objectives and the value of the compromised assets. Successfully identifying and responding to SharpRDP activity can prevent significant data breaches and system compromises.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the EQL rule &ldquo;Potential SharpRDP Behavior&rdquo; to your Elastic SIEM to detect the described behavior, tuning the <code>from</code> time frame as needed for your environment.</li>
<li>Enable Elastic Defend on all Windows endpoints to provide the necessary process, registry, and network event data for the EQL rule to function.</li>
<li>Investigate any alerts generated by the rule, focusing on the source IP address, user account, RunMRU registry modifications, and subsequent process executions.</li>
<li>Review the investigation guide included in the rule&rsquo;s <code>note</code> section for detailed triage and analysis steps.</li>
<li>Monitor network connections for incoming RDP traffic (destination port 3389) from unexpected source IP addresses, as this could indicate potential SharpRDP activity.</li>
<li>Implement restrictions on RDP access to controlled jump hosts and limit drive redirection where it is not required, per the post-incident hardening recommendations in the rule&rsquo;s <code>note</code> section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>lateral-movement</category><category>execution</category><category>windows</category><category>sharprdp</category></item></channel></rss>