
Summary
The rule identifies potential DCSync activities, a technique used by adversaries to retrieve sensitive credential information from a Windows Domain Controller (DC). By exploiting the DC's API, attackers can simulate the replication process to gain access to account credentials. This detection is specifically oriented towards Windows event logs, focusing on EventCode 4662 that signifies attempts to replicate directory changes. The rule employs a Splunk query to filter relevant events that match certain GUIDs associated with directory replication and excludes service accounts (denoted by the regex filter on the user field). Outputs are organized into a readable format, allowing for efficient monitoring and investigation of potential DCSync activities in an environment, particularly highlighting known threat actors such as FIN8 and Muddled Libra.
Categories
- Windows
- Network
- Cloud
- Application
- Identity Management
Data Sources
- Windows Registry
- Logon Session
- Process
- Active Directory
- Application Log
ATT&CK Techniques
- T1003.006
Created: 2024-02-09