
Summary
The detection rule monitors for temporary modifications to the Service Principal Name (SPN) attributes of Active Directory (AD) computer objects, specifically looking for patterns that may indicate a potential DCShadow attack. The DCShadow technique allows privileged attackers to mimic Domain Controller (DC) behavior, enabling them to create rogue controllers that can manipulate AD records maliciously. This rule uses Windows Event Logs 5136, which capture changes to directory service objects and 4624, which records logon events. By analyzing the specific attributes modified and their duration, this analytic can reveal suspicious activity whereby an SPN is added temporarily, suggesting a nefarious intention behind AD manipulations. Successful implementation requires appropriate audit settings on the AD environment.
Categories
- Identity Management
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1207
Created: 2024-12-10