
Summary
The rule "First Time Seen NewCredentials Logon Process" is designed to detect unusual processes in Windows that perform a NewCredentials logon type. This logon method allows processes to impersonate a user without initiating a fresh session, which can be exploited by attackers through access token manipulation to bypass security controls. The rule analyzes authentication events and filters for non-standard process paths to identify potential misuse. It utilizes KQL for querying Windows log data collected via Winlogbeat and is tuned to raise alerts on anomalous behaviors indicative of token forgery attacks. A risk score of 47 categorizes the severity as medium, engaging security teams to conduct triage and deeper investigations to validate the significance of detected events. It guides investigation with a structured methodology and outlines possible false positives related to legitimate administrative operations, ensuring that secure operations continue while maintaining vigilance against potential threats.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Application Log
- Process
ATT&CK Techniques
- T1134
- T1134.001
Created: 2023-11-15