
Summary
The detection rule identifies suspicious command-line activity related to querying the CachedLogonsCount registry value within the Winlogon registry on Windows systems. This behavior may indicate the potential use of post-exploitation tools such as Winpeas, which are designed to enumerate credentials and provide insights into cached logon settings. Given that this telemetry is captured from Endpoint Detection and Response (EDR) agents, it emphasizes the importance of command-line activities and registry queries in identifying possible credential theft attempts or lateral movement within a network. The detection rule employs a performance-tuned Splunk search query, ensuring that every instance of such activity is scrutinized, aiding security teams in flagging malicious or anomalous behavior effectively. This vigilance is crucial for maintaining robust endpoint security and preventing unauthorized access.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1003.005
- T1003
Created: 2024-11-13