SigmaHQ/rules/windows/builtin/win_susp_rc4_kerberos.yml

29 lines
876 B
YAML
Raw Normal View History

title: Suspicious Kerberos RC4 Ticket Encryption
2019-11-12 22:12:27 +00:00
id: 496a0e47-0a33-4dca-b009-9e6ca3591f39
status: experimental
references:
- https://adsecurity.org/?p=3458
2018-03-25 21:18:22 +00:00
- https://www.trimarcsecurity.com/single-post/TrimarcResearch/Detecting-Kerberoasting-Activity
2018-07-24 04:34:20 +00:00
tags:
2018-07-24 05:50:32 +00:00
- attack.credential_access
- attack.t1208 # an old one
2020-06-16 20:46:08 +00:00
- attack.t1558.003
description: Detects service ticket requests using RC4 encryption type
author: Florian Roth
date: 2017/02/06
logsource:
2017-02-19 10:08:23 +00:00
product: windows
service: security
detection:
selection:
EventID: 4769
TicketOptions: '0x40810000'
TicketEncryptionType: '0x17'
reduction:
- ServiceName: '$*'
condition: selection and not reduction
falsepositives:
- Service accounts used on legacy systems (e.g. NetApp)
- Windows Domains with DFL 2003 and legacy systems
2017-02-16 17:02:26 +00:00
level: medium