Detection rules › Kusto Query Language

AdminSDHolder Modifications

Author
Vasileios Paschalidis
Source
upstream

'This query detects modification in the AdminSDHolder in the Active Directory which could indicate an attempt for persistence. AdminSDHolder Modification is a persistence technique in which an attacker abuses the SDProp process in Active Directory to establish a persistent backdoor to Active Directory. This query searches for the event id 5136 where the Object DN is AdminSDHolder. Ref: https://netwrix.com/en/cybersecurity-glossary/cyber-security-attacks/adminsdholder-attack/'

MITRE ATT&CK coverage

TacticTechniques
Initial AccessT1078 Valid Accounts
PersistenceT1078 Valid Accounts
Privilege EscalationT1078 Valid Accounts
Defense EvasionT1078 Valid Accounts

Event coverage

ProviderEvent IDTitle
Security-Auditing5136A directory service object was modified.

Stages and Predicates

Stage 1: source

SecurityEvent

Stage 2: where

and
  EventData contains "<Data Name=\\\"ObjectDN\\\">CN=AdminSDHolder,CN=System"
  EventID eq "5136"

Stage 3: parse

Stage 4: summarize

Stage 5: extend

Stage 6: extend

Stage 7: extend

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
EventDatacontains
  • <Data Name=\"ObjectDN\">CN=AdminSDHolder,CN=System
EventIDeq
  • 5136 corpus 22 (splunk 22)