Microsoft-Windows-Security-Auditing › Event 4674

Event ID 4674 — An operation was attempted on a privileged object.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Privilege Use → Sensitive Privilege Use
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

An operation was attempted on a privileged object.

Message #

An operation was attempted on a privileged object.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Object Handle: %8

Process Information:
	Process ID: %11
	Process Name: %12

Requested Operation:
	Desired Access: %9
	Privileges: %10

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
ObjectServer UnicodeString[Object] Object Server.
ObjectType UnicodeString[Object] Object Type.
ObjectName UnicodeString[Object] Object Name.
HandleId Pointer[Object] Object Handle.
AccessMask UnicodeString[Requested Operation] Desired Access. Access mask reference
PrivilegeList UnicodeString[Requested Operation] Privileges. Privilege constants reference
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4674,
    "version": 0,
    "level": 0,
    "task": 13056,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T01:39:25.936087+00:00",
    "event_record_id": 273230,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 17676
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserName": "User",
    "SubjectDomainName": "WINDEV2310EVAL",
    "SubjectLogonId": "0x277c6",
    "ObjectServer": "Security",
    "ObjectType": "-",
    "ObjectName": "-",
    "HandleId": "0xfffffffffffffffc",
    "AccessMask": "1024",
    "PrivilegeList": "SeIncreaseBasePriorityPrivilege",
    "ProcessId": "0x39dc",
    "ProcessName": "C:\\Program Files\\WindowsApps\\Microsoft.SysinternalsSuite_2023.10.0.0_x64__8wekyb3d8bbwe\\Tools\\Procmon.exe"
  },
  "message": ""
}

Community Notes #

Logs direct interaction with objects that require SeSecurity/SeTakeOwnership, ie SAM hives.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Elastic # view in reference

References #