heroui logo

Potential Pass-the-Hash (PtH) Attempt

Elastic Detection Rules

View Source
Summary
The rule detects potential 'Pass-the-Hash' (PtH) attempts in Windows environments, where adversaries can authenticate using stolen password hashes to bypass normal access controls. This method allows attackers to move laterally within a network without needing the cleartext password of the account they impersonate. The detection focuses on specific logon events that indicate suspicious activity using certain logon types, user IDs, and processes associated with successful authentications. It leverages logs from various Windows services to identify these anomalies, contributing to an effective lateral movement detection strategy. The rule also provides guidance for investigation and response, including steps for recognizing false positives and remediating potential breaches.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1550
  • T1550.002
Created: 2023-03-29