-
Notifications
You must be signed in to change notification settings - Fork 521
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[New Rule] AD Group Modification by SYSTEM #3833
Conversation
Co-authored-by: Terrance DeJesus <[email protected]>
|
||
query = ''' | ||
iam where winlog.api == "wineventlog" and event.action == "added-member-to-group" and | ||
winlog.event_data.SubjectUserSid : "S-1-5-18" and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should exclude known AD managed service accounts (MSA) as well or do we want to include those?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I expect the MSAs to have a different SID, as this one should be limited to Local System
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good! Added some thoughts, but should not block.
Co-authored-by: Justin Ibarra <[email protected]>
* [New Rule] AD Group Modification by SYSTEM * . * Update rules/windows/persistence_group_modification_by_system.toml Co-authored-by: Terrance DeJesus <[email protected]> * Tighten up indexes * Update persistence_group_modification_by_system.toml * Apply suggestions from code review Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Terrance DeJesus <[email protected]> Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit deb08fd)
* [New Rule] AD Group Modification by SYSTEM * . * Update rules/windows/persistence_group_modification_by_system.toml Co-authored-by: Terrance DeJesus <[email protected]> * Tighten up indexes * Update persistence_group_modification_by_system.toml * Apply suggestions from code review Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Terrance DeJesus <[email protected]> Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit deb08fd)
* [New Rule] AD Group Modification by SYSTEM * . * Update rules/windows/persistence_group_modification_by_system.toml Co-authored-by: Terrance DeJesus <[email protected]> * Tighten up indexes * Update persistence_group_modification_by_system.toml * Apply suggestions from code review Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Terrance DeJesus <[email protected]> Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit deb08fd)
* [New Rule] AD Group Modification by SYSTEM * . * Update rules/windows/persistence_group_modification_by_system.toml Co-authored-by: Terrance DeJesus <[email protected]> * Tighten up indexes * Update persistence_group_modification_by_system.toml * Apply suggestions from code review Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Terrance DeJesus <[email protected]> Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit deb08fd)
* [New Rule] AD Group Modification by SYSTEM * . * Update rules/windows/persistence_group_modification_by_system.toml Co-authored-by: Terrance DeJesus <[email protected]> * Tighten up indexes * Update persistence_group_modification_by_system.toml * Apply suggestions from code review Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Terrance DeJesus <[email protected]> Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit deb08fd)
* [New Rule] AD Group Modification by SYSTEM * . * Update rules/windows/persistence_group_modification_by_system.toml Co-authored-by: Terrance DeJesus <[email protected]> * Tighten up indexes * Update persistence_group_modification_by_system.toml * Apply suggestions from code review Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Terrance DeJesus <[email protected]> Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit deb08fd)
Issues
Part of #3005
Summary
Identifies a user being added to an active directory group by the SYSTEM (S-1-5-18) user. This behavior can indicate that the attacker has achieved SYSTEM privileges in a domain controller, which attackers can obtain by exploiting vulnerabilities or abusing default group privileges (e.g., Server Operators), and is moving to a domain account.
Sample Data