Microsoft-Windows-Security-Auditing › Event 4964

Event ID 4964 — Special groups have been assigned to a new logon.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Special Logon
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

Special groups have been assigned to a new logon.

Message #

Special groups have been assigned to a new logon.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4
	Logon GUID: %5

New Logon:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9
	Logon GUID: %10
	Special Groups Assigned: %11

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
LogonGuid GUID[Subject] Logon GUID
TargetUserSid SID[New Logon] Security ID
TargetUserName UnicodeString[New Logon] Account Name
TargetDomainName UnicodeString[New Logon] Account Domain
TargetLogonId HexInt64[New Logon] Logon ID
TargetLogonGuid GUID[New Logon] Logon GUID
SidList UnicodeString[New Logon] Special Groups Assigned

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4964,
    "version": 0,
    "level": 0,
    "task": 12548,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2021-04-22T08:51:04.686763Z",
    "event_record_id": 435111,
    "correlation": {},
    "execution": {
      "process_id": 480,
      "thread_id": 2416
    },
    "channel": "Security",
    "computer": "fs03vuln.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "FS03VULN$",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x3e7",
    "LogonGuid": "00000000-0000-0000-0000-000000000000",
    "TargetUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
    "TargetUserName": "admmig",
    "TargetDomainName": "OFFSEC",
    "TargetLogonId": "0x74872",
    "TargetLogonGuid": "00000000-0000-0000-0000-000000000000",
    "SidList": "\r\n\t\t%{S-1-5-21-4230534742-2542757381-3142984815-1613}"
  }
}

Community Notes #

Detects Domain Admins or other high-value SIDs logging onto non-DC hosts.

References #