Skip to content

Commit 0e6ec1f

Browse files
w0rk3rgithub-actions[bot]
authored andcommitted
[New Rule] AD Group Modification by SYSTEM (#3833)
* [New Rule] AD Group Modification by SYSTEM * . * Update rules/windows/persistence_group_modification_by_system.toml Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com> * Tighten up indexes * Update persistence_group_modification_by_system.toml * Apply suggestions from code review Co-authored-by: Justin Ibarra <16747370+brokensound77@users.noreply.github.com> --------- Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com> Co-authored-by: Justin Ibarra <16747370+brokensound77@users.noreply.github.com> (cherry picked from commit deb08fd)
1 parent 8bab0df commit 0e6ec1f

File tree

1 file changed

+67
-0
lines changed

1 file changed

+67
-0
lines changed
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
[metadata]
2+
creation_date = "2024/06/26"
3+
integration = ["system", "windows"]
4+
maturity = "production"
5+
updated_date = "2024/06/26"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
Identifies a user being added to an active directory group by the SYSTEM (S-1-5-18) user. This behavior can indicate
11+
that the attacker has achieved SYSTEM privileges in a domain controller, which attackers can obtain by exploiting
12+
vulnerabilities or abusing default group privileges (e.g., Server Operators), and is attempting to pivot to a domain account.
13+
"""
14+
from = "now-9m"
15+
index = ["winlogbeat-*", "logs-system.security*", "logs-windows.forwarded*"]
16+
language = "eql"
17+
license = "Elastic License v2"
18+
name = "Active Directory Group Modification by SYSTEM"
19+
risk_score = 47
20+
rule_id = "6f024bde-7085-489b-8250-5957efdf1caf"
21+
severity = "medium"
22+
tags = [
23+
"Domain: Endpoint",
24+
"OS: Windows",
25+
"Use Case: Threat Detection",
26+
"Tactic: Persistence",
27+
"Use Case: Active Directory Monitoring",
28+
"Data Source: Active Directory",
29+
]
30+
timestamp_override = "event.ingested"
31+
type = "eql"
32+
33+
query = '''
34+
iam where winlog.api == "wineventlog" and event.code == "4728" and
35+
winlog.event_data.SubjectUserSid : "S-1-5-18" and
36+
37+
/* DOMAIN_USERS and local groups */
38+
not group.id : "S-1-5-21-*-513"
39+
'''
40+
41+
42+
[[rule.threat]]
43+
framework = "MITRE ATT&CK"
44+
[[rule.threat.technique]]
45+
id = "T1098"
46+
name = "Account Manipulation"
47+
reference = "https://attack.mitre.org/techniques/T1098/"
48+
49+
50+
[rule.threat.tactic]
51+
id = "TA0003"
52+
name = "Persistence"
53+
reference = "https://attack.mitre.org/tactics/TA0003/"
54+
55+
[[rule.threat]]
56+
framework = "MITRE ATT&CK"
57+
[[rule.threat.technique]]
58+
id = "T1098"
59+
name = "Account Manipulation"
60+
reference = "https://attack.mitre.org/techniques/T1098/"
61+
62+
63+
[rule.threat.tactic]
64+
id = "TA0004"
65+
name = "Privilege Escalation"
66+
reference = "https://attack.mitre.org/tactics/TA0004/"
67+

0 commit comments

Comments
 (0)