
Summary
This detection rule focuses on identifying the use of Pass-the-Hash (PtH) techniques, which involve leveraging hashed credentials from victim systems or users to authenticate elsewhere. The rule leverages Windows Event logs, specifically monitoring for Event Code 4624, which indicates logon events using NTLM authentication with Logon Type 3. The logic extracts user accounts with a dollar sign suffix, indicating machine accounts, which is common in PtH attacks. The detection is significant in scenarios where a computer account password has been reset, similar to the ZeroLogon exploit scenario, which could allow attackers to misuse machine accounts. The rule relies on the `get_endpoint_data` and `get_endpoint_data_winevent` functions to gather relevant endpoint data and format it for analysis. By capturing these events, the detection rule aims to flag potential unauthorized lateral movements within the network.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Application Log
- Logon Session
ATT&CK Techniques
- T1550.002
Created: 2024-02-09