
Summary
This detection rule is designed to identify suspicious logon events that may indicate a local privilege escalation attempt using a Kerberos relay attack. It focuses on events where the Logon Package is Kerberos, representing a potentially concerning scenario if the event occurs with a remote address of localhost (127.0.0.1) and if it is targeting the built-in local Administrator account, which is associated with a specific Security Identifier (SID). The essential details captured by the detection rule include the detection of Event ID 4624, indicating a successful logon attempt, with a particular emphasis on Logon Type 3 (network logon). The condition checks for logons made using Kerberos where the source IP is set to 127.0.0.1, and the Target User SID indicates the Administrator account (ending with '-500'). This pattern may reflect attempts to leverage Kerberos relay vulnerabilities, which can be exploited to elevate privileges from a standard domain user to local System privileges. Such activities are critical to detect, as they signify attempts to bypass security mechanisms and could lead to severe compromises if left unchecked.
Categories
- Windows
- Endpoint
Data Sources
- Logon Session
- Windows Registry
Created: 2022-04-27