
Summary
This detection rule identifies the creation of a new computer account by an existing computer account in a Windows environment, specifically looking for the Service Principal Name (SPN) "RestrictedKrbHost". This behavior is monitored through Windows Security Event Logs by analyzing Event Code 4741. The alert is significant because it may be indicative of an attacker attempting to exploit Kerberos authentication mechanisms, potentially allowing for lateral movement and privilege escalation within a network. If this behavior is confirmed as malicious, it could enable an attacker to impersonate services or maintain persistence while accessing sensitive information.
Categories
- Endpoint
- Windows
- Identity Management
Data Sources
- Windows Registry
- Windows Registry
- Active Directory
ATT&CK Techniques
- T1558
Created: 2024-11-13