Facebook Instagram Linkedin
  • Home
  • Active Directory Attack
  • Network Attack
  • SIEM
  • TOOLS
  • IOC
  • Mitre Att&ck
  • E-Mail Attack
  • Editors Pick
Search
Security Investigation Be the first to investigate
  • Home
  • Active Directory Attack
    • Threat Hunting Using Windows Security Log

      CVE-2023-21554 – Hunt For MSMQ QueueJumper In The Environment

      OS Credential Dumping- LSASS Memory vs Windows Logs

      Credential Dumping using Windows Network Providers – How to Respond

      The Flow of Event Telemetry Blocking – Detection & Response

  • Network Attack
    • DNS sinkholes to Prevent Malware? How did it work?

      Threat Hunting using DNS logs – Soc Incident Response Procedure

      What is Port Forwarding and the Security Risks?

      Threat Hunting using Firewall Logs – Soc Incident Response Procedure

      Threat Hunting with Zeek – Log Types and Use cases

  • SIEM
    • The Most Important Data Exfiltration Techniques for a Soc Analyst to…

      Soc Interview Questions and Answers – CYBER SECURITY ANALYST

      Anatomy Of An Advanced Persistent Threat Group

      The Benefits of Cybersecurity Training Online for Remote Employees

      Cybersecurity Playbook for SOC

  • TOOLS
    • Pestudio: Initial Malware Assessment Made Simple

      How Attackers Manipulate LLMs in ML – Attack Vectors

      How to Remove Database Malware from Your Website

      PECmd – Windows Prefetch Analysis For Incident Responders

      How Brazilian students use AI

  • IOC
    • Phishing Scam Alert: Fraudulent Emails Requesting to Clear Email Storage Space…

      Vidar Infostealer Malware Returns with new TTPS – Detection & Response

      New WhiskerSpy Backdoor via Watering Hole Attack -Detection & Response

      RedLine Stealer returns with New TTPS – Detection & Response

      Understanding Microsoft Defender Threat Intelligence (Defender TI)

  • Mitre Att&ck
    • Threat Hunting Playbooks For MITRE TACTICS

      Masquerade Attack Part 2 – Suspicious Services and File Names

      Masquerade Attack – Everything You Need To Know in 2022

      MITRE D3FEND Knowledge Guides to Design Better Cyber Defenses

      Mapping MITRE ATT&CK with Window Event Log IDs

  • E-Mail Attack
    • How DKIM SPF & DMARC Work to Prevent Email Spoofing and…

      How Email Encryption Protects Your Privacy

      How To Check Malicious Phishing Links

      Emotet Malware with Microsoft OneNote- How to Block emails based on…

      How DMARC is used to reduce spoofed emails ?

  • Editors Pick
Home Active Directory Attack Persistence Remote Password Reset – Event IDs to Monitor
  • Active Directory Attack

Persistence Remote Password Reset – Event IDs to Monitor

By
BalaGanesh
-
October 21, 2021
0

Adversaries may manipulate accounts to maintain access to victim systems. Account manipulation may consist of any action that preserves adversary access to a compromised account, such as modifying credentials or permission groups. These actions could also include account activity designed to subvert security policies, such as performing iterative password updates to bypass password duration policies and preserve the life of compromised credentials. In order to create or manipulate accounts, the adversary must already have sufficient permissions on systems or the domain.

Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding start-up code.

Also Read: Latest IOCs – Threat Actor URLs , IP’s & Malware Hashes

Hunting the Suspicious Account Remote Password Resets:

  • Compromised account tries to reset user password to stay Persistence across systems. To Track such activities. For the Event ID 4624 ( An account was successfully logged on ) , Drill down the network logon activities which is Logon Type 3 and retrieve unique Logon IDs. This will populate the list of accounts of users or administrator with successful logons on the network.
  • Next stage, try to figure out the Logon ID that is unique and Event IDs are different. So Each Event ID should have the Logon ID “0x853237” , In this example we have Logon ID “0x853237” , In you environment this number will change. Investigate accordingly.
  • Here we see Logon ID “0x853237” matches for the Event ID “5145” which is network share object (file or folder) is accessed. The Share information has Relative target name which is known to be an accessed file or folder.

Also Read: Threat Hunting with EventID 5145 – Object Access – Detailed File Share

Source/Credits: https://twitter.com/SBousseaden
  • Finally Track for the Event ID “4724” ( An attempt was made to reset an accounts password  ) with the Logon ID “0x853237” to check the accounts the is targeted.
  • Drill down with Event ID 4724 , Target account information reveals the Attacker has targeting the account name “01566S-WIN16-IR$” which is highlighted in green colour.

Also Read: Soc Interview Questions and Answers – CYBER SECURITY ANALYST

  • Specifically, an event code 4624, followed by an event code of 4724 is triggered when the vulnerability is exploited on hosts.
  • Event ID “4738” ( A user account was changed  )  triggers when an attacker has successfully resets the password.
  • Possible Use cases includes, MimiKatz usage , Attempts to changes a user password , Account manipulation Detection, Anonymous logons.

Hunt Query:

query = ”’sequence by host.id with maxspan=5m [authentication where event.action==”logged-in” and

/* event 4624 need to be logged */ winlog.logon.type:”Network” and event.outcome == “success” and source.ip != null and

source.ip != “127.0.0.1” and source.ip != “::1”] by winlog.event_data.TargetLogonId /* event 4724 need to be logged */

[iam where event.action == “reset-password”] by winlog.event_data.SubjectLogonId

Source/Credit: https://twitter.com/SBousseaden

Happy Hunting!

  • TAGS
  • account password reset attempts
  • event id 4624
  • event id 4624 logon type 3
  • event id 4724
  • event id 4724 anonymous logon
  • event id 4724 attacks
  • event id 4724 password change
  • event id 4738
  • event id 5145
  • event id 5145 bloodhound
  • event id 5145 detailed file share
  • Persistence Remote Password Reset
  • suspicious account password reset
Share
Facebook
Linkedin
Twitter
Pinterest
Telegram
ReddIt
WhatsApp
    Previous articleLateral Movement Detection with Windows Event Logs
    Next articleWhat is the MITRE ATT&CK Framework? How Is It Useful
    BalaGanesh
    BalaGanesh
    https://www.socinvestigation.com
    Balaganesh is a Incident Responder. Certified Ethical Hacker, Penetration Tester, Security blogger, Founder & Author of Soc Investigation.
    • Latest Cyber Security News
    • AbuseIPDB
    • Web Archive
    • Sucuri Web Malware
    • About Us
    • Contact Us
    • Privacy Policy
    © Newspaper WordPress Theme by TagDiv