Detection rules › Kusto Query Language

Non Domain Controller Active Directory Replication

Source
upstream

'This query detects potential attempts by non-computer accounts (non domain controllers) to retrieve/synchronize an active directory object leveraging directory replication services (DRS). A Domain Controller (computer account) would usually be performing these actions in a domain environment. Another detection rule can be created to cover domain controllers accounts doing at rare times. A domain user with privileged permissions to use directory replication services is rare.'

MITRE ATT&CK coverage

TacticTechniques
Credential AccessT1003.006 OS Credential Dumping: DCSync

Event coverage

ProviderEvent IDTitle
Security-Auditing4624An account was successfully logged on.
Security-Auditing4662An operation was performed on an object.

Stages and Predicates

Stage 1: source

SecurityEvent

Stage 2: where

and
  EventID eq "4662"
  ObjectServer eq "DS"

Stage 3: where

AccountType ne "Machine"

Stage 4: where

or
  Properties match "1131f6aa-9c07-11d1-f79f-00c04fc2dcd2"
  Properties match "1131f6ad-9c07-11d1-f79f-00c04fc2dcd2"
  Properties match "89e95b76-444d-4c62-991a-0facbeda640c"

Stage 5: project

Stage 6: join

Stage 7: project-reorder

Stage 8: extend

Stage 9: extend

Stage 10: extend

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
AccountTypene
  • Machine
EventIDeq
  • 4662 corpus 4 (splunk 4)
ObjectServereq
  • DS
Propertiesmatch
  • 1131f6aa-9c07-11d1-f79f-00c04fc2dcd2 corpus 2 (sigma 2)
  • 1131f6ad-9c07-11d1-f79f-00c04fc2dcd2 corpus 2 (sigma 2)
  • 89e95b76-444d-4c62-991a-0facbeda640c corpus 2 (sigma 2)