Possible External RDP Brute-Force
#
This Playbook is part of the Core - Investigation and Response Pack.Supported versions
Supported Cortex XSOAR versions: 6.8.0 and later.
This playbook investigates a “Possible External RDP Brute Force” XDR Alert by gathering user, IP, and hostname information, and investigating if the following suspicious elements exists:
- "IP Reputation" - DBot Score is 2-3
- "Source geolocation" - RDP Connection made from rare geo-location
- Related to campaign - IP address is related to campaign, based on TIM module
- Hunting results - the hunt for indicators related to the source IP and the related campaign returned results
- XDR Alert search - XDR Alerts that related to the same username and endpoint, and to the MITRE tactics that comes after "Credential Access", were found.
- Risky User - The user that was identified in the attack was given a medium or high score by the Core integration's ITDR module.
- Risky Host - The destination host that was identified in the attack was given a medium or high score by the Core integration's ITDR module.
Set verdict method:
Critical Element - The "Critical Element" input allows you to select a specific element that, if identified as suspicious, the investigation's final verdict will be deemed a "True Positive".
Final Verdict - Each suspicious element is being added to an array called "Suspicious Elements", which is used to count potential security threats. The array size will be compared to a final threshold. If the size is greater than or equal to the threshold, the investigation's final verdict will be deemed a "True Positive".
User Engagement - The "UserEngagementThreshold" input allows you to set the number of suspicious elements that trigger user engagement. When this threshold is met, an email will be sent to the user and their manager asking for authorization of RDP activity. If the RDP activity is not authorized by the user, the investigation's final verdict will be deemed a "True Positive".
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooks- Block Indicators - Generic v3
- Threat Hunting - Generic
- Get entity alerts by MITRE tactics
- TIM - Indicator Relationships Analysis
- Endpoint Enrichment - Generic v2.1
- Possible External RDP Brute-Force - Set Verdict
- Account Enrichment - Generic v2.1
- User Investigation - Generic
#
Integrations- CoreIOCs
- CortexCoreIR
#
Scripts- Set
- IsIntegrationAvailable
#
Commands- core-isolate-endpoint
- ip
- ad-expire-password
- setIncident
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
Username | RDP connection username. | alert.username | Optional |
ExternalIP | Source external IP address. | alert.localip | Optional |
AutoRemediation | Set this value to "true" to enable auto remediation (IP Block and User Block). | false | Optional |
FinalThreshold | The threshold number of suspicious elements required to determine a 'True Positive' verdict. | 2 | Optional |
CriticalElement | You can select a specific element that, if identified as suspicious, will automatically set the final verdict as true positive. The following options are available: IP Reputation Related Campaign Hunting Results Related Alerts Unusual Country Risky User Risky Host NOTE: You can read about the meaning of every element in the playbook description. | Optional | |
UserEngagementThreshold | The threshold number of suspicious elements that will trigger a user engagement. Set 0 to disable user engagement. NOTICE: If this threshold is equal to or higher than "FinalThreshold", the final verdict will be deemed by the user response and not by the FinalThreshold calculation. | 1 | Optional |
Hostname | RDP connection destination hostname. | alert.hostname | Optional |
EndpointID | RDP connection destination endpoint ID. | alert.agentid | Optional |
Country | Source external IP country. | alert.country | Optional |
IsolateEndpoint | Set this value to "true" to enable endpoint isolation in case of a true positive. | false | Optional |
SOCEmailAddress | The SOC email address to use for the user engagement section. | Optional | |
EarlyContainment | Set this value to "true" to allow early containment when the IP is known malicious | true | Optional |
#
Playbook OutputsThere are no outputs for this playbook.