
Summary
The detection rule targets the CVE-2024-49113 vulnerability, also known as LDAPNightmare, which allows an unpatched Windows Server to be crashed remotely when the DNS server of the victim domain controller has internet connectivity. This rule specifically looks for application errors related to 'lsass.exe' and 'WLDAP32.dll' identified through Windows Application event ID 1000. By monitoring logs for these events, the rule aims to detect abnormal activities that may indicate attempts to exploit this vulnerability, allowing security teams to respond swiftly to potential denial of service attacks on Windows endpoints. The rule is implemented in Splunk using a query that fetches relevant endpoint data and presents it in a structured table for analysis.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Application Log
- Process
- Network Share
ATT&CK Techniques
- T1499
Created: 2025-01-10