2022-09-19 20:04:08 +02:00
[ metadata ]
creation_date = "2022/08/30"
2023-02-02 16:22:44 -05:00
integration = [ "system" , "windows" ]
2022-09-19 20:04:08 +02:00
maturity = "production"
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
min_stack_version = "8.3.0"
2023-05-15 20:31:59 -03:00
updated_date = "2023/04/27"
2022-09-19 20:04:08 +02:00
[ rule ]
author = [ "Elastic" ]
description = "" "
Identifies process creation with alternate credentials. Adversaries may create a new process with a different token to
escalate privileges and bypass access controls.
" ""
from = "now-9m"
2022-12-21 06:30:04 -08:00
index = [ "winlogbeat-*" , "logs-system.*" , "logs-windows.*" ]
2022-09-19 20:04:08 +02:00
language = "eql"
license = "Elastic License v2"
name = "Process Creation via Secondary Logon"
note = "" "## Setup
Audit events 4624 and 4688 are needed to trigger this rule.
If enabling an EQL rule on a non-elastic-agent index (such as beats) for versions <8.2, events will not define `event.ingested` and default fallback for EQL rules was not added until 8.2, so you will need to add a custom pipeline to populate `event.ingested` to @timestamp for this rule to work.
" ""
references = [ "https://attack.mitre.org/techniques/T1134/002/" ]
risk_score = 47
rule_id = "42eeee3d-947f-46d3-a14d-7036b962c266"
severity = "medium"
tags = [ "Elastic" , "Host" , "Windows" , "Threat Detection" , "Privilege Escalation" ]
type = "eql"
query = '' '
2022-12-21 06:30:04 -08:00
sequence by winlog.computer_name with maxspan=1m
2022-09-19 20:04:08 +02:00
2023-05-15 20:31:59 -03:00
[authentication where event.action:"logged-in" and
2022-11-01 17:45:39 +00:00
event.outcome == "success" and user.id : ("S-1-5-21-*", "S-1-12-1-*") and
2022-09-19 20:04:08 +02:00
/* seclogon service */
2023-01-04 09:30:07 -05:00
process.name == "svchost.exe" and
2022-09-19 20:04:08 +02:00
winlog.event_data.LogonProcessName : "seclogo*" and source.ip == "::1" ] by winlog.event_data.TargetLogonId
2023-05-15 20:31:59 -03:00
[process where event.type == "start"] by winlog.event_data.TargetLogonId
2022-09-19 20:04:08 +02:00
' ''
[ [ rule . threat ] ]
framework = "MITRE ATT&CK"
[ [ rule . threat . technique ] ]
id = "T1134"
name = "Access Token Manipulation"
reference = "https://attack.mitre.org/techniques/T1134/"
[ [ rule . threat . technique . subtechnique ] ]
id = "T1134.002"
name = "Create Process with Token"
reference = "https://attack.mitre.org/techniques/T1134/002/"
[ [ rule . threat . technique . subtechnique ] ]
id = "T1134.003"
name = "Make and Impersonate Token"
reference = "https://attack.mitre.org/techniques/T1134/003/"
[ rule . threat . tactic ]
id = "TA0004"
name = "Privilege Escalation"
reference = "https://attack.mitre.org/tactics/TA0004/"