Files
blue-team-tools/rules/windows/builtin/win_susp_failed_logons_single_source.yml
T

35 lines
935 B
YAML
Raw Normal View History

title: Multiple Failed Logins with Different Accounts from Single Source System
2019-11-12 23:12:27 +01:00
id: e98374a6-e2d9-4076-9b5c-11bdb2569995
description: Detects suspicious failed logins with different user accounts from a single source system
2017-02-19 00:31:59 +01:00
author: Florian Roth
2018-07-24 07:50:32 +02:00
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1078
2017-02-19 00:31:59 +01:00
logsource:
2017-02-19 11:08:23 +01:00
product: windows
service: security
2016-12-27 14:49:54 +01:00
detection:
2018-03-26 22:53:38 +02:00
selection1:
2017-02-15 23:53:08 +01:00
EventID:
- 529
- 4625
UserName: '*'
WorkstationName: '*'
2018-03-26 22:53:38 +02:00
selection2:
EventID: 4776
UserName: '*'
Workstation: '*'
timeframe: 24h
2018-03-26 22:53:38 +02:00
condition:
- selection1 | count(UserName) by WorkstationName > 3
- selection2 | count(UserName) by Workstation > 3
2016-12-27 14:49:54 +01:00
falsepositives:
2016-12-27 23:09:41 +01:00
- Terminal servers
- Jump servers
- Other multiuser systems like Citrix server farms
- Workstations with frequently changing users
2017-02-16 18:02:26 +01:00
level: medium
2017-02-19 11:08:23 +01:00