LoFP LoFP / t1550

t1550

TitleTags
a service principal may be created by a system or network administrator. verify whether the username, hostname, and/or resource name should be making changes in your environment. service principal additions from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
a user may have multiple sessions open at the same time, such as on a mobile device and a laptop.
administrator activity
although highly unlikely, legitimate applications may use the same command line parameters as mimikatz.
although unlikely, legitimate applications may use the same command line parameters as rubeus. filter as needed.
application credential additions may be done by a system or network administrator. verify whether the username, hostname, and/or resource name should be making changes in your environment. application credential additions from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
assumerole from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
assumerole may be done by a system or network administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
automated processes that use terraform may lead to false positives.
automated processes that uses terraform may lead to false positives.
based on microsoft documentation, legacy systems or applications will use rc4-hmac as the default encryption for tgt requests. specifically, systems before windows server 2008 and windows vista. newer systems will use aes128 or aes256.
custom applications may leverage the kerberos protocol. filter as needed.
developers may leverage third-party applications for legitimate purposes in google workspace such as for administrative tasks.
environments that use ntlmv1
getsessiontoken may be done by a system or network administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment. getsessiontoken from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
getsignintoken events will occur when using aws sso portal to login and will generate false positives if you do not filter for the expected user agent(s), see filter. non-sso configured roles would be abnormal and should be investigated.
go utilities that use staaldraad awesome ntlm library
legacy hosts
legitimate applications may obtain a handle for winlogon.exe. filter as needed
legitimate logon activity by authorized ntlm systems may be detected by this search. please investigate as appropriate.
legitimate remote administration activity
runas command-line tool using /netonly parameter
saml provider being updated from unfamiliar users should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
saml provider could be updated by a system administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment. saml provider updates by unfamiliar users should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
sts:getsessiontoken can be very noisy as in certain environments numerous calls of this type can be executed. this search can be adjusted to provide specific values to identify cases of abuse. in specific environments the use of field requestparameters.serialnumber will need to be used.
unlikely
web browsers and third party application might generate similar activity. an initial baseline is required.