Event ID: 4648
Contains process name "C:\Windows\System32\mstsc.exe"
indicator for user machine with outbound RDP connections detected.
can be mapped to Mitre T1076.
can be traces of lateral movement.
Event Message contains "*/TERMSRV/*"
Known as RDP outbound connection from end user machine.
Indicator of possible lateral movement
Process name "C:\Windows\System32\sc.exe"
shows remote machine services are queried and executed
indicator of possible lateral movement
can be mapped to T1021/T1035
Threat actor persistence with new service account with alternate credentials were 4648 at the time of the incident.
this can include other services running with specific account other than local system or network service.
This can be mapped to mitre T1050.
Threat actors can use valid accounts to interact with remote machines.
They can interact remote machines by taking advantage of Distributed Component Object Model (DCOM)
This is mostly using RPC calls. This can request a service from a program located in another computer on the network.
check if the event contains "RPCSS/"
Can be mapped to T1021/T1175
Inbound RDP connections can be used by threat actors.
process name "Winlogon.exe" and Network address is not empty or equal to loopback address.
This can be associated with interactive logon activity (logon type equals 10 or 7)
Can be mapped to T1076.
Possible windows admin share access.
includes command prompt commands.
e.g. x:\target/user:server\admin01
and process ID "0x4"
can be mapped to mitre T1077.
Contains Process Name "wmic.exe"
Indicator of lateral movement with Windows Management Instrumentation.
Can be mapped to T1047.
Last updated