Event ID 6038 — Microsoft Windows Server has detected that NTLM authentication is presently being used between clients and this server.
Message #
Fields #
| Name | Description |
|---|---|
Data_0 | — |
Binary | — |
Example Event #
{
"system": {
"provider": "LsaSrv",
"guid": "{199fe037-2b82-40a9-82ac-e1d46c792b99}",
"event_source_name": "LsaSrv",
"event_id": 6038,
"version": 0,
"level": 3,
"task": 0,
"opcode": 0,
"keywords": 36028797018963968,
"time_created": "2022-04-07T17:39:24.046564+00:00",
"event_record_id": 1326,
"correlation": {},
"execution": {
"process_id": 0,
"thread_id": 0
},
"channel": "System",
"computer": "WIN-FPV0DSIC9O6.lab.local",
"security": {
"user_id": ""
}
},
"event_data": {
"Data_0": "",
"Binary": ""
},
"message": ""
}
Detection Patterns #
Defense Evasion: Pass the Hash
LsaSrv Event ID 6038: Microsoft Windows Server has detected that NTLM authentication is presently being used between clients and this server.OREvent ID 6039: Microsoft Windows Server has detected that NTLM authentication is being used between clients and this server.
1 rule
References #
- Example event sourced from https://github.com/NextronSystems/evtx-baseline