
Summary
This detection rule identifies suspicious modifications to critical Active Directory attributes that can signal malicious activity or privilege escalation attempts. The attributes monitored include "msDS-AllowedToDelegateTo", "msDS-AllowedToActOnBehalfOfOtherIdentity", "msDS-KeyCredentialLink", "scriptPath", and "msTSInitialProgram". The rule captures events of type 5136, which refer to modifications in the security logs, and alerts if any of these specific attributes are changed. Such changes could indicate a breach or unauthorized administrative actions that require immediate investigation. Additionally, the search query processes and correlates relevant data such as user identity, target objects, and their attributes, ensuring the analyst receives a comprehensive view of the incident. Tune-out configurations are suggested for scenarios involving legitimate attribute modifications, as this can reduce false positives from frequent legitimate administrative actions.
Categories
- Windows
- Endpoint
- Identity Management
Data Sources
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1550
- T1222
- T1222.001
Created: 2025-01-21