Detection rules › Kusto Query Language

WDigest downgrade attack

Source
upstream

'When the WDigest Authentication protocol is enabled, plain text passwords are stored in the Local Security Authority Subsystem Service (LSASS) exposing them to theft. This setting will prevent WDigest from storing credentials in memory. Ref: https://www.stigviewer.com/stig/windows_7/2016-12-19/finding/V-72753'

MITRE ATT&CK coverage

TacticTechniques
Credential AccessT1003 OS Credential Dumping

Event coverage

ProviderEvent IDTitle
Sysmon13RegistryEvent (Value Set)

Stages and Predicates

Stage 1: source

Event

Stage 2: where

and
  EventID eq "13"
  EventLog eq "Microsoft-Windows-Sysmon/Operational"

Stage 3: parse

Stage 4: where

and
  Details ne "DWORD (0x00000000)"
  TargetObject eq "HKLM\\\\System\\\\CurrentControlSet\\\\Control\\\\SecurityProviders\\\\WDigest\\\\UseLogonCredential"

Stage 5: summarize

Stage 6: extend

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Detailsne
  • DWORD (0x00000000)
EventIDin
  • 13
EventLogeq
  • Microsoft-Windows-Sysmon/Operational
TargetObjecteq
  • HKLM\\System\\CurrentControlSet\\Control\\SecurityProviders\\WDigest\\UseLogonCredential