heroui logo

Suspicious Certificate Authentication

Anvilogic Forge

View Source
Summary
This detection rule is designed to identify suspicious certificate authentication attempts that may indicate malicious activity, such as an adversary stealing a root certificate from an Active Directory Certificate Authority (CA) to forge legitimate certificates for user or computer accounts. The rule specifically focuses on monitoring Kerberos ticket requests associated with certificate thumbprints, which may signal an attempt to authenticate using a forged certificate. The Splunk logic retrieves relevant Windows event logs (Event ID 4768) to capture instances where certificates are being used in the authentication process. By filtering for these event codes and analyzing the associated certificate issuer names, the rule can flag anomalous authentications that deviate from expected behavior. This is particularly important in environments where the integrity of certificate-based authentication is critical. The detection employs statistical aggregation over time and various process attributes to provide context around potential threats, leveraging both event data and process information to enhance the visibility of suspicious activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1556
Created: 2025-07-02