heroui logo

Active Directory Replication from Non Machine Account

Sigma Rules

View Source
Summary
This rule is designed to detect potentially malicious attempts to abuse the Active Directory Replication Service (ADRS) by non-machine accounts. The Active Directory is a critical service for managing domain resources, and its replication capabilities can be exploited by attackers to request sensitive information, such as user credentials, from domain controllers. The detection logic focuses on specific EventID 4662 operations where the access mask indicates a request for replication rights. Non-standard user accounts, such as those ending with a '$' sign or starting with 'MSOL_', are flagged as suspicious when they attempt to perform these operations, as they typically represent machine accounts or managed service identities. This rule helps in identifying cases where an unauthorized account may attempt to leverage the ADRS to gain access to sensitive data undetected, which could signify a privilege escalation attempt or post-exploitation activity.
Categories
  • Windows
  • Identity Management
Data Sources
  • Active Directory
  • Logon Session
  • Application Log
Created: 2019-07-26