heroui logo

Account Tampering - Suspicious Failed Logon Reasons

Sigma Rules

View Source
Summary
This rule identifies potential account tampering by monitoring for unusual error codes associated with failed logins on Windows systems. It focuses on specific event IDs (4625 and 4776) that report failed logon attempts and correlates them with predefined unusual status codes. These codes may indicate attempts to access accounts that are disabled or have restricted access, thus signifying suspicious behavior. The rule incorporates a filter to exclude legitimate failed logon attempts from the query results by filtering out events generated by a null (invalid) user account SID. The overall goal is to detect and alert on potentially malicious activities aimed at manipulating user accounts via unauthorized logon attempts.
Categories
  • Windows
  • Endpoint
  • Identity Management
Data Sources
  • Windows Registry
  • Logon Session
Created: 2017-02-19