heroui logo

Interactive Logon by an Unusual Process

Elastic Detection Rules

View Source
Summary
The rule "Interactive Logon by an Unusual Process" detects potential unauthorized access attempts on Windows systems where a logon is initiated through an uncommon executable. It focuses on scenarios where an interactive logon is conducted using alternate credentials, which commonly indicates privilege escalation attempts through techniques such as Access Token Manipulation. The rule triggers on the Windows event log entry 4624, specifying filters based on the process name, logon type, user SIDs, and exclusions of recognized legitimate executables, thereby highlighting attempts that may bypass normal access control mechanisms. With a high severity and risk score of 73, this rule is crucial for identifying malicious activities that leverage unauthorized processes to escalate privileges within the system, supported by guidelines for investigation, false positive management, and remediation steps.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Application Log
  • Logon Session
  • Process
ATT&CK Techniques
  • T1134
  • T1134.002
  • T1134.003
Created: 2023-12-04