heroui logo

Successful Overpass the Hash Attempt

Sigma Rules

View Source
Summary
This detection rule identifies successful logon attempts on a Windows system that utilize Logon Type 9 (NewCredentials), which is indicative of the "Overpass the Hash" attack technique used by attackers to gain unauthorized access to accounts. This type of attack allows an adversary to authenticate using stolen hashed passwords without needing to know the plaintext password. The detection is focused on log events where the Event ID is 4624, specifically looking for the LogonProcessName as 'seclogo' and the AuthenticationPackageName as 'Negotiate'. If these criteria are matched, it suggests that an attacker may be using tools like Mimikatz's sekurlsa::pth to bypass standard authentication flows for lateral movement across a network. The implementation of this rule is critical in identifying potential credential theft and misuse, which could lead to unauthorized access to sensitive resources.
Categories
  • Windows
  • Endpoint
  • Identity Management
Data Sources
  • Windows Registry
  • Logon Session
  • Application Log
Created: 2018-02-12