Detection rules › Sigma

Successful Overpass the Hash Attempt

Severity
high
Author
Roberto Rodriguez (source), Dominik Schaudel (rule)
Source
upstream

Detects successful logon with logon type 9 (NewCredentials) which matches the Overpass the Hash behavior of e.g Mimikatz's sekurlsa::pth module.

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1550.002 Use Alternate Authentication Material: Pass the Hash
Lateral MovementT1550.002 Use Alternate Authentication Material: Pass the Hash

Event coverage

ProviderEvent IDTitle
Security-Auditing4624An account was successfully logged on.

Stages and Predicates

Stage 1: selection

AuthenticationPackageName: Negotiate
LogonProcessName: seclogo
LogonType: 9

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
AuthenticationPackageNameeq
  • Negotiate corpus 3 (sigma 3)
LogonProcessNameeq
  • seclogo corpus 3 (sigma 2, elastic 1)
LogonTypeeq
  • 9 corpus 5 (sigma 5)

Neighbors

Broader alternatives (more inclusive than this rule)

These rules match a superset of what this rule catches. They cover the same events plus more. Use them if you want wider coverage and can absorb more false positives.