70411664cf
* normalizing hunting link generation * replacing header * adjusting quotes in f-strings * added source file to metadata * removed os dependency * address bug in source file links * reverting TOML loading * change all List type hinting to list * change all List type hinting to list * fixed accented characters in queries * reverted accent character removal; moved macos query and MD to macos folder
1.8 KiB
1.8 KiB
Windows Logon Activity by Source IP
Metadata
-
Author: Elastic
-
Description: This hunt returns a summary of network logon activity by
source.ipusing Windows event IDs 4624 and 4625. The higher the number of failures, low success and multiple accounts the more suspicious the behavior is. -
UUID:
441fba85-47a9-4f1f-aab4-569bbfdc548b -
Integration: system
-
Language:
[ES|QL] -
Source File: Windows Logon Activity by Source IP
Query
from logs-system.security-*
| where @timestamp > now() - 7 day
| where host.os.family == "windows" and
event.category == "authentication" and event.action in ("logon-failed", "logged-in") and winlog.logon.type == "Network" and
source.ip is not null and
/* noisy failure status codes often associated to authentication misconfiguration */
not (event.action == "logon-failed" and winlog.event_data.Status in ("0xC000015B", "0XC000005E", "0XC0000133", "0XC0000192"))
| eval failed = case(event.action == "logon-failed", source.ip, null), success = case(event.action == "logged-in", source.ip, null)
| stats count_failed = count(failed), count_success = count(success), count_user = count_distinct(winlog.event_data.TargetUserName) by source.ip
/* below threshold should be adjusted to your env logon patterns */
| where count_failed >= 100 and count_success <= 10 and count_user >= 20
Notes
- Pay close attention to IP address sources with a high number of failed connections associated with low success attempts and high number of user accounts.
MITRE ATT&CK Techniques
License
Elastic License v2