heroui logo

User Couldn't Call a Privileged Service 'LsaRegisterLogonProcess'

Sigma Rules

View Source
Summary
The detection rule monitors attempts to call the 'LsaRegisterLogonProcess' function in Windows, which is responsible for verifying whether an application has the required 'SeTcbPrivilege' to act as a logon process. If an entity without this privilege tries to invoke this function, it may indicate an attempt at privilege escalation or lateral movement, particularly associated with threats like Rubeus, which is commonly used to manipulate Windows authentication and perform attacks against Active Directory environments. This rule focuses on events flagged by Event ID 4673, specifically targeting calls to the service that indicate potential security breaches originating from unauthorized applications. The detection framework uses specific keywords and service identifiers to filter relevant log entries, ensuring that alerts are generated for potentially malicious activities.
Categories
  • Windows
  • Endpoint
  • Cloud
Data Sources
  • User Account
  • Windows Registry
  • Logon Session
  • Process
Created: 2019-10-24