← Back to SOC feed Coverage →

.RDP File Created By Uncommon Application

sigma HIGH SigmaHQ
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

Adversaries may create RDP files using uncommon applications to establish unauthorized remote access, bypassing standard detection mechanisms. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential lateral movement or persistence tactics that evade traditional monitoring.

Detection Rule

Sigma (Original)

title: .RDP File Created By Uncommon Application
id: fccfb43e-09a7-4bd2-8b37-a5a7df33386d
related:
    - id: f748c45a-f8d3-4e6f-b617-fe176f695b8f
      type: derived
status: test
description: |
    Detects creation of a file with an ".rdp" extension by an application that doesn't commonly create such files.
references:
    - https://www.blackhillsinfosec.com/rogue-rdp-revisiting-initial-access-methods/
    - https://web.archive.org/web/20230726144748/https://blog.thickmints.dev/mintsights/detecting-rogue-rdp/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-04-18
modified: 2024-11-01
tags:
    - attack.defense-evasion
logsource:
    product: windows
    category: file_event
detection:
    selection:
        TargetFilename|endswith: '.rdp'
        Image|endswith:
            # Covers browsers
            - '\brave.exe'
            - '\CCleaner Browser\Application\CCleanerBrowser.exe'
            - '\chromium.exe'
            - '\firefox.exe'
            - '\Google\Chrome\Application\chrome.exe'
            - '\iexplore.exe'
            - '\microsoftedge.exe'
            - '\msedge.exe'
            - '\Opera.exe'
            - '\Vivaldi.exe'
            - '\Whale.exe'
            # Covers email clients
            - '\olk.exe' # Outlook
            - '\Outlook.exe'
            - '\RuntimeBroker.exe' # If the windows mail client is used
            - '\Thunderbird.exe'
            # Covers chat applications
            - '\Discord.exe' # Should open the browser for download, but just in case.
            - '\Keybase.exe'
            - '\msteams.exe'
            - '\Slack.exe'
            - '\teams.exe'
    condition: selection
falsepositives:
    - Unknown
level: high

KQL (Azure Sentinel)

imFileEvent
| where TargetFileName endswith ".rdp" and (TargetFilePath endswith "\\brave.exe" or TargetFilePath endswith "\\CCleaner Browser\\Application\\CCleanerBrowser.exe" or TargetFilePath endswith "\\chromium.exe" or TargetFilePath endswith "\\firefox.exe" or TargetFilePath endswith "\\Google\\Chrome\\Application\\chrome.exe" or TargetFilePath endswith "\\iexplore.exe" or TargetFilePath endswith "\\microsoftedge.exe" or TargetFilePath endswith "\\msedge.exe" or TargetFilePath endswith "\\Opera.exe" or TargetFilePath endswith "\\Vivaldi.exe" or TargetFilePath endswith "\\Whale.exe" or TargetFilePath endswith "\\olk.exe" or TargetFilePath endswith "\\Outlook.exe" or TargetFilePath endswith "\\RuntimeBroker.exe" or TargetFilePath endswith "\\Thunderbird.exe" or TargetFilePath endswith "\\Discord.exe" or TargetFilePath endswith "\\Keybase.exe" or TargetFilePath endswith "\\msteams.exe" or TargetFilePath endswith "\\Slack.exe" or TargetFilePath endswith "\\teams.exe")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_rdp_file_susp_creation.yml