/
windows_multiple_account_passwords_changed.yml
59 lines (59 loc) · 2.53 KB
/
windows_multiple_account_passwords_changed.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
name: Windows Multiple Account Passwords Changed
id: faefb681-14be-4f0d-9cac-0bc0160c7280
version: 1
date: '2024-02-20'
author: Mauricio Velazco, Splunk
data_source:
- Windows Event Log Security 4724
type: TTP
status: production
description: This Splunk detection identifies situations where over five unique Windows account passwords are changed within a 10-minute interval, captured by Event Code 4724 in the Windows Security Event Log. The query utilizes the wineventlog_security dataset, organizing data into 10-minute periods to monitor the count and distinct count of TargetUserName, the accounts with altered passwords. Rapid password changes across multiple accounts are atypical and might indicate unauthorized access or an internal actor compromising account security. Teams should calibrate the detection's threshold and timeframe to fit their specific operational context.
search: ' `wineventlog_security` EventCode=4724 status=success
| bucket span=10m _time
| stats count dc(user) as unique_users values(user) as user by EventCode signature _time src_user SubjectDomainName TargetDomainName Logon_ID
| where unique_users > 5
| `windows_multiple_account_passwords_changed_filter`'
how_to_implement: To successfully implement this search, you need to be ingesting
Domain Controller events with the Windows TA. The Advanced Security Audit policy setting
`Audit User Account Management` within `Account Management` needs to be enabled.
known_false_positives: Service accounts may be responsible for the creation, deletion or modification of accounts for legitimate purposes. Filter as needed.
references:
- https://attack.mitre.org/techniques/T1098/
tags:
analytic_story:
- Azure Active Directory Persistence
asset_type: Endpoint
confidence: 60
impact: 40
message: User $src_user$ changed the passwords of multiple accounts in a short period of time.
mitre_attack_id:
- T1098
- T1078
observable:
- name: src_user
type: User
role:
- Victim
product:
- Splunk Enterprise
- Splunk Enterprise Security
- Splunk Cloud
required_fields:
- _time
- EventCode
- success
- TargetUserName
- SubjectUserName
- src_user
- SubjectDomainName
- TargetDomainName
- Logon_ID
- user
risk_score: 24
security_domain: endpoint
tests:
- name: True Positive Test
attack_data:
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1098/windows_multiple_passwords_changed/windows_multiple_passwords_changed.log
source: XmlWinEventLog:Security
sourcetype: XmlWinEventLog