Detection rules › Sigma

Pass the Hash Activity 2

Severity
medium
Author
Dave Kennedy, Jeff Warren (method) / David Vassallo (rule)
Source
upstream

Detects the attack technique pass the hash which is used to move laterally inside the network

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1550.002 Use Alternate Authentication Material: Pass the Hash
Lateral MovementT1550.002 Use Alternate Authentication Material: Pass the Hash

Event coverage

ProviderEvent IDTitle
Security-Auditing4624An account was successfully logged on.

Stages and Predicates

Stage 1: 1 of selection_logon3

KeyLength: 0
LogonProcessName: NtLmSsp
LogonType: 3
SubjectUserSid: S-1-0-0

Stage 2: 1 of selection_logon9

LogonProcessName: seclogo
LogonType: 9

Stage 3: not filter

TargetUserName: 'ANONYMOUS LOGON'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
KeyLengtheq
  • 0
LogonProcessNameeq
  • NtLmSsp
  • seclogo corpus 3 (sigma 2, elastic 1)
LogonTypeeq
  • 3 corpus 12 (splunk 7, sigma 5)
  • 9 corpus 5 (sigma 5)
SubjectUserSideq
  • S-1-0-0 corpus 2 (sigma 2)
TargetUserNameeq
  • ANONYMOUS LOGON corpus 3 (sigma 3)

Neighbors

Broader alternatives (more inclusive than this rule)

These rules match a superset of what this rule catches. They cover the same events plus more. Use them if you want wider coverage and can absorb more false positives.