Detection rules › Elastic

Potential Pass-the-Hash (PtH) Attempt

Author
Elastic
Source
upstream

Adversaries may pass the hash using stolen password hashes to move laterally within an environment, bypassing normal system access controls. Pass the hash (PtH) is a method of authenticating as a user without having access to the user's cleartext password.

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1550 Use Alternate Authentication Material, T1550.002 Use Alternate Authentication Material: Pass the Hash
Lateral MovementT1550 Use Alternate Authentication Material, T1550.002 Use Alternate Authentication Material: Pass the Hash

Event coverage

ProviderEvent IDTitle
Security-Auditing4624An account was successfully logged on.

Stages and Predicates

Stage 1: kql:new_terms

(user.id:"S-1-12-1-*" or user.id:"S-1-5-21-*") and event.action:"logged-in" and event.category:"authentication" and event.outcome:"success" and winlog.event_data.LogonProcessName:"seclogo" and winlog.logon.type:"NewCredentials"

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
event.actioneq
  • logged-in corpus 7 (elastic 7)
event.categoryeq
  • authentication corpus 5 (elastic 5)
event.outcomeeq
  • success corpus 8 (elastic 8)
user.idwildcard
  • S-1-12-1-* corpus 3 (elastic 3)
  • S-1-5-21-* corpus 3 (elastic 3)
winlog.event_data.LogonProcessNameeq
  • seclogo corpus 3 (sigma 2, elastic 1)
winlog.logon.typeeq
  • NewCredentials

Neighbors

Broader alternatives (more inclusive than this rule)

These rules match a superset of what this rule catches. They cover the same events plus more. Use them if you want wider coverage and can absorb more false positives.