Detectionhightest
Ngrok Usage with Remote Desktop Service
Detects cases in which ngrok, a reverse proxy tool, forwards events to the local RDP port, which could be a sign of malicious behaviour
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Windowsterminalservices-localsessionmanager
ProductWindows← raw: windows
Serviceterminalservices-localsessionmanager← raw: terminalservices-localsessionmanager
Detection Logic
Detection Logic1 selector
detection:
selection:
EventID: 21
Address|contains: '16777216'
condition: selectionFalse Positives
Unknown
False positive likelihood has not been assessed. Additional context may be needed during triage.
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
64d51a51-32a6-49f0-9f3d-17e34d640272
Status
test
Level
high
Type
Detection
Created
Fri Apr 29
Path
rules/windows/builtin/terminalservices/win_terminalservices_rdp_ngrok.yml
Raw Tags
attack.command-and-controlattack.t1090