SigmaHQ/rules/windows/builtin/win_susp_ntlm_auth.yml

26 lines
777 B
YAML
Raw Normal View History

2018-06-08 09:45:49 +00:00
title: NTLM Logon
2019-11-12 22:12:27 +00:00
id: 98c3bcf1-56f2-49dc-9d8d-c66cf190238b
2018-06-08 09:45:49 +00:00
status: experimental
description: Detects logons using NTLM, which could be caused by a legacy source or attackers
references:
- https://twitter.com/JohnLaTwC/status/1004895028995477505
- https://goo.gl/PsqrhT
author: Florian Roth
date: 2018/06/08
2018-07-24 05:50:32 +00:00
tags:
2019-03-05 23:43:42 +00:00
- attack.lateral_movement
- attack.t1075
2020-06-16 20:46:08 +00:00
- attack.t1550.002
2018-06-08 09:45:49 +00:00
logsource:
product: windows
service: ntlm
definition: Reqiures events from Microsoft-Windows-NTLM/Operational
2018-06-08 09:45:49 +00:00
detection:
selection:
EventID: 8002
CallingProcessName: '*' # We use this to avoid false positives with ID 8002 on other log sources if the logsource isn't set correctly
condition: selection
falsepositives:
- Legacy hosts
level: low