LoFP LoFP / t1548

t1548

TitleTags
actions of a legitimate telnet client
anti virus products
applications integrated with aws might assume roles to access aws resources.
as the script block is a blob of text. false positive may occur with scripts that contain the keyword as a reference or simply use it for detection.
assumerole from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
assumerole may be done by a system or network administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
automated processes that uses terraform may lead to false positives.
automated workflows might assume roles to perform periodic tasks such as data backups, updates, or deployments.
automated workflows might assume root to perform periodic administrative tasks.
aws administrators or automated processes might regularly assume roles for legitimate administrative purposes.
aws administrators or automated processes might regularly assume root for legitimate administrative purposes.
aws services might assume roles to access aws resources as part of their standard operations.
aws services might assume root to access aws resources as part of their standard operations.
domain controller user logon
false positives may be generated by administrators installing benign applications using run-as/elevation.
false positives should be limited as `services.exe` should never spawn a process from `admin$`. filter as needed.
false positives will be present based on many factors. tune the correlation as needed to reduce too many triggers.
false-positives (fp) can appear if another remote terminal service is being used to connect to it's listener but typically ssh is used in these scenarios.
getsessiontoken may be done by a system or network administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment. getsessiontoken from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
legitimate administration activities
legitimate cmstp use (unlikely in modern enterprise environments)
legitimate iam administrators may attach customer-managed policies to roles for various reasons, such as granting temporary permissions or updating existing policies. ensure that the user attaching the policy is authorized to do so and that the action is expected.
legitimate powershell web access installations by administrators
legitimate use of cmstp.exe utility by legitimate user
legitimate use of fodhelper.exe utility by legitimate user
misconfigured role permissions
role chaining can be used as an access control. ensure that this behavior is not part of a legitimate operation before taking action.
saml provider being updated from unfamiliar users should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
system administrator usage
uncommon sudo activity can be due to an engineer logging onto a server instance in order to perform manual troubleshooting or reconfiguration.
unknown how many legitimate software products use that method
unknown sub processes of wsreset.exe
unlikely
user removed from the group is approved
windowsapps located in \"c:\program files\windowsapps\\"