Detection rules › Elastic
Process Creation via Secondary Logon
Identifies process creation with alternate credentials. Adversaries may create a new process with a different token to escalate privileges and bypass access controls.
MITRE ATT&CK coverage
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Security-Auditing | 4624 | An account was successfully logged on. |
Stages and Predicates
Stage 1: eql:authentication
event.action:"logged-in" and event.outcome:"success" and process.name:"svchost.exe" and source.ip:"::1" and user.id:"S-1-5-21-*" and winlog.event_data.LogonProcessName:"seclogo*"Stage 2: eql:process
event.type:"start"Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
event.action | wildcard |
|
event.outcome | eq |
|
event.type | eq |
|
process.name | eq |
|
source.ip | eq |
|
user.id | wildcard |
|
winlog.event_data.LogonProcessName | wildcard |
|