Detection rules › Elastic

Access to a Sensitive LDAP Attribute

Author
Elastic
Source
upstream

Identify access to sensitive Active Directory object attributes that contains credentials and decryption keys such as unixUserPassword, ms-PKI-AccountCredentials and msPKI-CredentialRoamingTokens.

MITRE ATT&CK coverage

TacticTechniques
Initial AccessT1078 Valid Accounts, T1078.002 Valid Accounts: Domain Accounts
PersistenceT1078 Valid Accounts, T1078.002 Valid Accounts: Domain Accounts
Privilege EscalationT1078 Valid Accounts, T1078.002 Valid Accounts: Domain Accounts
Defense EvasionT1078 Valid Accounts, T1078.002 Valid Accounts: Domain Accounts
Credential AccessT1003 OS Credential Dumping, T1552 Unsecured Credentials, T1552.004 Unsecured Credentials: Private Keys, T1649 Steal or Forge Authentication Certificates
CollectionT1213 Data from Information Repositories

Event coverage

ProviderEvent IDTitle
Security-Auditing4662An operation was performed on an object.

Stages and Predicates

Stage 1: eql:any

not winlog.event_data.AccessMask:(0x0 or 0x100) and not winlog.event_data.SubjectUserSid:"S-1-5-18" and winlog.event_data.Properties:"612cb747-c0e8-4f92-9221-fdd5f15b550d"

Exclusions

Top-level NOT(...) conjuncts — predicates this rule actively suppresses.

StageFieldKindExcluded values
1AccessMaskin0x0, 0x100
2SubjectUserSideqS-1-5-18

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
winlog.event_data.Propertieswildcard
  • *612cb747-c0e8-4f92-9221-fdd5f15b550d*
  • *b3f93023-9239-4f7c-b99c-6745d87adbc2*
  • *b7ff5a38-0818-42b0-8110-d3d154c97f24*
  • *b8dfa744-31dc-4ef1-ac7c-84baf7ef9da7*