Event ID 4756 — A member was added to a security-enabled universal group.
Description
A member was added to a security-enabled universal group.
Message #
Fields #
| Name | Description |
|---|---|
Account_Name | [Member] Account Name. |
Security_ID | [Member] Security ID. |
Account_Name | [Group] Account Name. |
Account_Domain | [Group] Account Domain. |
Security_ID | [Group] Security ID. |
Security_ID | [Subject] Security ID. |
Account_Name | [Subject] Account Name. |
Account_Domain | [Subject] Account Domain. |
Logon_ID | [Subject] Logon ID. |
Privileges | [Additional Information] Privileges. Privilege constants reference |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Auditing",
"guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
"event_source_name": "",
"event_id": 4756,
"version": 0,
"level": 0,
"task": 13826,
"opcode": 0,
"keywords": 9232379236109516800,
"time_created": "2020-07-12T06:01:13.765572Z",
"event_record_id": 16088267,
"correlation": {},
"execution": {
"process_id": 528,
"thread_id": 3156
},
"channel": "Security",
"computer": "rootdc1.offsec.lan",
"security": {
"user_id": ""
}
},
"event_data": {
"MemberName": "CN=honey-pot1,OU=Test-OU,OU=OFFSEC-COMPANY,DC=offsec,DC=lan",
"MemberSid": "S-1-5-21-4230534742-2542757381-3142984815-1159",
"TargetUserName": "Enterprise Admins",
"TargetDomainName": "OFFSEC",
"TargetSid": "S-1-5-21-4230534742-2542757381-3142984815-519",
"SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1158",
"SubjectUserName": "lambda-user",
"SubjectDomainName": "OFFSEC",
"SubjectLogonId": "0x80e25b9",
"PrivilegeList": "-"
}
}
Detection Patterns #
Security-Auditing Event ID 4728: A member was added to a security-enabled global group.OREvent ID 4732: A member was added to a security-enabled local group.OREvent ID 4756: A member was added to a security-enabled universal group.
3 rules
Kusto Query Language
Persistence: Domain Account
Security-Auditing Event ID 4727: A security-enabled global group was created.ANDEvent ID 4731: A security-enabled local group was created.ANDEvent ID 4744: A security-disabled local group was created.ANDEvent ID 4749: A security-disabled global group was created.ANDEvent ID 4754: A security-enabled universal group was created.ANDEvent ID 4756: A member was added to a security-enabled universal group.ANDEvent ID 4759: A security-disabled universal group was created.ANDEvent ID 4783: A basic application group was created.ANDEvent ID 4790: An LDAP query group was created.
1 rule
Community Notes #
May capture cross-domain privilege escalation in a multi-forest trust.
References #
- Microsoft Learn https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4756
- Microsoft Learn Audit Policy https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-security-group-management
- Ultimate Windows Security https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4756
- Example event sourced from https://github.com/Yamato-Security/hayabusa-sample-evtx