heroui logo

Service Creation via Local Kerberos Authentication

Elastic Detection Rules

View Source
Summary
This rule detects a suspicious local logon event in Windows environments where the Logon Package used is Kerberos, the remote address is 'localhost', and is followed by the creation of a service from the same LogonId. Such behavior could indicate a Kerberos relay attack, which allows malicious actors to escalate privileges locally from a domain user to local System privileges. Monitoring specific authentication events along with the creation of services provides a proactive defense against unauthorized privilege escalation attempts. The detection involves tracking logon events and correlating them with subsequent service installation events to identify potential misuse of Kerberos authentication.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1543
  • T1543.003
  • T1558
Created: 2022-04-27