
Summary
This rule detects a suspicious local logon event in Windows environments where the Logon Package used is Kerberos, the remote address is 'localhost', and is followed by the creation of a service from the same LogonId. Such behavior could indicate a Kerberos relay attack, which allows malicious actors to escalate privileges locally from a domain user to local System privileges. Monitoring specific authentication events along with the creation of services provides a proactive defense against unauthorized privilege escalation attempts. The detection involves tracking logon events and correlating them with subsequent service installation events to identify potential misuse of Kerberos authentication.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Logon Session
- Application Log
ATT&CK Techniques
- T1543
- T1543.003
- T1558
Created: 2022-04-27