title: Terminal Service Process Spawn id: 1012f107-b8f1-4271-af30-5aed2de89b39 status: experimental description: Detects a process spawned by the terminal service server process (this could be an indicator for an exploitation of CVE-2019-0708) references: - https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/rdp-stands-for-really-do-patch-understanding-the-wormable-rdp-vulnerability-cve-2019-0708/ author: Florian Roth date: 2019/05/22 modified: 2020/08/29 tags: - attack.initial_access - attack.t1190 - attack.lateral_movement - attack.t1210 - car.2013-07-002 logsource: product: windows category: process_creation detection: selection: ParentCommandLine|contains|all: - '\svchost.exe' - 'termsvcs' filter: Image|endswith: '\rdpclip.exe' condition: selection and not filter falsepositives: - Unknown level: high