mirror of
https://github.com/valitydev/atomic-threat-coverage.git
synced 2024-11-06 17:45:23 +00:00
93 lines
3.2 KiB
YAML
93 lines
3.2 KiB
YAML
title: DN_0004_4624_windows_account_logon
|
|
description: >
|
|
An account was successfully logged on
|
|
loggingpolicy:
|
|
- LP_0004_windows_audit_logon
|
|
references:
|
|
- https://github.com/MicrosoftDocs/windows-itpro-docs/blob/95b9d7c01805839c067e352d1d16702604b15f11/windows/security/threat-protection/auditing/event-4688.md
|
|
category: OS Logs
|
|
platform: Windows
|
|
type: Windows Log
|
|
channel: Security
|
|
provider: Microsoft-Windows-Security-Auditing
|
|
fields:
|
|
- EventID
|
|
- AccountName # redundant
|
|
- Hostname # redundant
|
|
- Computer
|
|
- SubjectUserSid
|
|
- SubjectUserName
|
|
- SubjectDomainName
|
|
- SubjectLogonId
|
|
- TargetUserSid
|
|
- TargetUserName
|
|
- TargetDomainName
|
|
- TargetLogonId
|
|
- LogonType
|
|
- LogonProcessName
|
|
- AuthenticationPackageName
|
|
- WorkstationName
|
|
- LogonGuid
|
|
- TransmittedServices
|
|
- LmPackageName
|
|
- KeyLength
|
|
- ProcessId
|
|
- ProcessName
|
|
- IpAddress
|
|
- IpPort
|
|
- ImpersonationLevel
|
|
- RestrictedAdminMode
|
|
- TargetOutboundUserName
|
|
- TargetOutboundDomainName
|
|
- VirtualAccount
|
|
- TargetLinkedLogonId
|
|
- ElevatedToken
|
|
sample: |
|
|
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
|
|
- <System>
|
|
<Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
|
|
<EventID>4624</EventID>
|
|
<Version>2</Version>
|
|
<Level>0</Level>
|
|
<Task>12544</Task>
|
|
<Opcode>0</Opcode>
|
|
<Keywords>0x8020000000000000</Keywords>
|
|
<TimeCreated SystemTime="2015-11-12T00:24:35.079785200Z" />
|
|
<EventRecordID>211</EventRecordID>
|
|
<Correlation ActivityID="{00D66690-1CDF-0000-AC66-D600DF1CD101}" />
|
|
<Execution ProcessID="716" ThreadID="760" />
|
|
<Channel>Security</Channel>
|
|
<Computer>WIN-GG82ULGC9GO</Computer>
|
|
<Security />
|
|
</System>
|
|
- <EventData>
|
|
<Data Name="SubjectUserSid">S-1-5-18</Data>
|
|
<Data Name="SubjectUserName">WIN-GG82ULGC9GO$</Data>
|
|
<Data Name="SubjectDomainName">WORKGROUP</Data>
|
|
<Data Name="SubjectLogonId">0x3e7</Data>
|
|
<Data Name="TargetUserSid">S-1-5-21-1377283216-344919071-3415362939-500</Data>
|
|
<Data Name="TargetUserName">Administrator</Data>
|
|
<Data Name="TargetDomainName">WIN-GG82ULGC9GO</Data>
|
|
<Data Name="TargetLogonId">0x8dcdc</Data>
|
|
<Data Name="LogonType">2</Data>
|
|
<Data Name="LogonProcessName">User32</Data>
|
|
<Data Name="AuthenticationPackageName">Negotiate</Data>
|
|
<Data Name="WorkstationName">WIN-GG82ULGC9GO</Data>
|
|
<Data Name="LogonGuid">{00000000-0000-0000-0000-000000000000}</Data>
|
|
<Data Name="TransmittedServices">-</Data>
|
|
<Data Name="LmPackageName">-</Data>
|
|
<Data Name="KeyLength">0</Data>
|
|
<Data Name="ProcessId">0x44c</Data>
|
|
<Data Name="ProcessName">C:\\Windows\\System32\\svchost.exe</Data>
|
|
<Data Name="IpAddress">127.0.0.1</Data>
|
|
<Data Name="IpPort">0</Data>
|
|
<Data Name="ImpersonationLevel">%%1833</Data>
|
|
<Data Name="RestrictedAdminMode">-</Data>
|
|
<Data Name="TargetOutboundUserName">-</Data>
|
|
<Data Name="TargetOutboundDomainName">-</Data>
|
|
<Data Name="VirtualAccount">%%1843</Data>
|
|
<Data Name="TargetLinkedLogonId">0x0</Data>
|
|
<Data Name="ElevatedToken">%%1842</Data>
|
|
</EventData>
|
|
</Event>
|