Detection rules › Kusto Query Language

Sign-ins from IPs that attempt sign-ins to disabled accounts (Uses Authentication Normalization)

Source
upstream

'Identifies IPs with failed attempts to sign in to one or more disabled accounts signed in successfully to another account. To use this analytics rule, make sure you have deployed the ASIM normalization parsers'

MITRE ATT&CK coverage

TacticTechniques
Initial AccessT1078 Valid Accounts
PersistenceT1078 Valid Accounts, T1098 Account Manipulation
Privilege EscalationT1078 Valid Accounts, T1098 Account Manipulation
Defense EvasionT1078 Valid Accounts

Event coverage

ProviderEvent IDTitle
Security-Auditing4624An account was successfully logged on.
Security-Auditing4625An account failed to log on.
Security-Auditing4634An account was logged off.

Stages and Predicates

Stage 1: source

imAuthentication

Stage 2: where

EventResult eq "Failure"

Stage 3: where

EventResultDetails eq "User disabled"

Stage 4: summarize

Stage 5: sort

Stage 6: join

Stage 7: where

successfulAccountSigninCount is_not_null

Stage 8: project

Stage 9: sort

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
EventResulteq
  • Failure
EventResultDetailseq
  • User disabled