Analytics Story: Windows RDP Artifacts and Defense Evasion

Description

Monitors for behaviors associated with Remote Desktop Protocol (RDP) usage on a Windows system, followed by actions consistent with artifact cleanup or defense evasion. When a user initiates an RDP session using the native client (mstsc.exe), Windows generates several artifacts, including Default.rdp in the user’s Documents folder and bitmap cache files (.bmc, cache.bin) under the Terminal Server Client cache directory. These files can be valuable for forensic analysis, as they indicate remote access activity and may sometimes reveal details about the accessed system’s graphical environment.

Why it matters

Adversaries who know about these artifacts may try to delete or overwrite them after an RDP session to avoid detection and hinder incident response. When a user connects to a system using the native RDP client (mstsc.exe), Windows creates several files that can later be used as forensic evidence. These include Default.rdp in the user’s Documents folder, which stores recent connection details such as the last server accessed and user preferences, as well as bitmap cache files (.bmc, cache.bin) in the Terminal Server Client cache directory, which can contain fragments of the remote system’s graphical environment. Together, these artifacts help investigators confirm that RDP activity occurred, identify which hosts were accessed, and sometimes even reconstruct portions of what the attacker saw on screen. Because of their forensic value, attackers often attempt to remove them. Common evasion methods include manually deleting the files, running cleanup scripts, disabling RDP caching features, or using non-standard RDP clients that do not generate artifacts. This detection looks for signs of RDP usage followed by suspicious cleanup activity, surfacing post-access OPSEC behavior that frequently precedes or accompanies lateral movement, privilege escalation, or data theft. Detecting this pattern is key to exposing stealthy attacker behavior in interactive intrusions.

Detections

Name ▲▼ Technique ▲▼ Type ▲▼
Enable RDP In Other Port Number Remote Services TTP
Remote Desktop Process Running On System Remote Desktop Protocol Hunting
Windows Default RDP File Creation Remote Desktop Protocol Anomaly
Windows Default Rdp File Deletion File Deletion Anomaly
Windows Default Rdp File Unhidden Remote Desktop Protocol Anomaly
Windows Modify Registry Disable RDP Modify Registry Anomaly
Windows MSTSC RDP Commandline Remote Desktop Protocol Anomaly
Windows Rdp AutomaticDestinations Deletion File Deletion Anomaly
Windows RDP Bitmap Cache File Creation Remote Desktop Protocol Anomaly
Windows RDP Cache File Deletion File Deletion Anomaly
Windows RDP Client Launched with Admin Session Remote Desktop Protocol Anomaly
Windows RDP Connection Successful RDP Hijacking Hunting
Windows RDP File Execution Spearphishing Attachment, Remote Desktop Protocol TTP
Windows RDP Login Session Was Established Remote Desktop Protocol Anomaly
Windows RDP Server Registry Deletion File Deletion Anomaly
Windows RDP Server Registry Entry Created Remote Desktop Protocol Anomaly
Windows RDPClient Connection Sequence Events External Remote Services Anomaly
Windows Remote Service Rdpwinst Tool Execution Remote Desktop Protocol TTP
Windows Remote Services Allow Rdp In Firewall Remote Desktop Protocol Anomaly
Windows Remote Services Rdp Enable Remote Desktop Protocol TTP
Windows Service Create with Tscon Windows Service, RDP Hijacking TTP
Remote Desktop Network Traffic Remote Desktop Protocol Anomaly
Windows Remote Desktop Network Bruteforce Attempt Password Guessing Anomaly

Data Sources

Name ▲▼ Platform ▲▼ Sourcetype ▲▼ Source ▲▼
CrowdStrike ProcessRollup2 N/A crowdstrike:events:sensor crowdstrike
Sysmon EventID 1 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 11 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 12 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 13 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 23 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 26 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 3 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Windows Event Log Microsoft Windows TerminalServices RDPClient 1024 Windows icon Windows WinEventLog WinEventLog:Microsoft-Windows-TerminalServices-RDPClient/Operational
Windows Event Log RemoteConnectionManager 1149 Windows icon Windows wineventlog WinEventLog:Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational
Windows Event Log Security 4624 Windows icon Windows XmlWinEventLog XmlWinEventLog:Security
Windows Event Log Security 4688 Windows icon Windows XmlWinEventLog XmlWinEventLog:Security
Zeek Conn N/A bro:conn:json bro:conn:json

References


Source: GitHub | Version: 2