mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-08 10:13:57 +00:00
f83d0e36b8
— deleted useless KeyLength: '0' — added filter condition to exclude AccountName='ANONYMOUS LOGON', because of false positives [1] [1] http://serverfault.com/questions/338644/what-are-anonymous-logons-in-win dows-event-log
29 lines
1.1 KiB
YAML
29 lines
1.1 KiB
YAML
title: Detects Pass the Hash Activity
|
|
status: experimental
|
|
description: 'Detects the attack technique pass the hash which is used to move laterally inside the network'
|
|
reference: https://github.com/iadgov/Event-Forwarding-Guidance/tree/master/Events
|
|
author: Ilias el Matani (rule), The Information Assurance Directorate at the NSA (method)
|
|
logsource:
|
|
product: windows
|
|
service: security
|
|
description: The successful use of PtH for lateral movement between workstations would trigger event ID 4624, a failed logon attempt would trigger an event ID 4625
|
|
detection:
|
|
selection:
|
|
- EventID: 4624
|
|
LogonType: '3'
|
|
LogonProcess: 'NtLmSsp'
|
|
WorkstationName: '%Workstations%'
|
|
ComputerName: '%Workstations%'
|
|
- EventID: 4625
|
|
LogonType: '3'
|
|
LogonProcess: 'NtLmSsp'
|
|
WorkstationName: '%Workstations%'
|
|
ComputerName: '%Workstations%'
|
|
filter:
|
|
AccountName: 'ANONYMOUS LOGON'
|
|
condition: selection and not filter
|
|
falsepositives:
|
|
- Administrator activity
|
|
- Penetration tests
|
|
level: medium
|