
Summary
This detection rule identifies modifications to the sIDHistory attributes associated with user or computer objects in Active Directory (AD) across different domains, which is critical for detecting potential inter-domain privilege escalation attempts. The rule utilizes Windows Security Event Codes 4742 (A user account was changed) and 4738 (A user account was changed) to monitor for changes specifically to the sIDHistory attribute. The ability for users to inherit permissions from other AD accounts, through the sIDHistory attribute, is significant as adversaries can exploit this feature to gain unauthorized access to resources, maintain persistence, and escalate privileges within the domain environment. The detection logic filters for alterations to the SidHistory value which differ from the expected values, flagging potential abuse of trust relationships between domains.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1134.005
- T1134
Created: 2024-12-10