heroui logo

Windows Multiple Account Passwords Changed

Splunk Security Content

View Source
Summary
This detection rule identifies instances where more than five unique Windows account passwords are changed within a 10-minute interval, indicating potential unauthorized access or internal compromise. It utilizes Event Code 4724 from the Windows Security Event Log, analyzing the 'wineventlog_security' dataset to monitor changes in distinct TargetUserName values. Rapid password modifications across multiple accounts are atypical behaviors that warrant investigation as they may lead to significant security risks, including unauthorized access to sensitive data and interrupting services. Implementing this rule requires ingesting Domain Controller events using the Windows TA and enabling the 'Audit User Account Management' policy to effectively capture these events.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1098
  • T1078
Created: 2024-11-13