Module 4 - Event IDs-Logging-SIEMs
Module 4 - Event IDs-Logging-SIEMs
1 Introduction
4.7 Tools
The upcoming slides will help you determine which logs are more
significant then others when we’re hunting for specific attack
signatures.
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Windows Event Logs are built into all versions of Windows. It
allows us to audit and monitor software and hardware events
on the machine.
• Application
• System
• Security
Any events that are logged from Windows system components are
predetermined.
This particular event had an ID value of 1129. In the properties for this
particular event we were fortunate enough to get some clear
information as to why this error occurred but what happens when the
information is not clear?
Lucky for us Microsoft has a useful search engine called Events and
Errors Message Center.
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
So we see that the EID (event ID) value is indeed useful and
Microsoft provided a utility to get more information about a
specific EID.
Logon Type 2 is an interactive login (a user physically logged into the computer)
https://docs.microsoft.com/en-us/windows/device-security/auditing/event-4624
9 NewCredentials A called cloned its current token and specified new credentials (runas
command).
10 RemoteInteractive A user logged onto computer using Terminal Services or RDP.
11 CachedInteractive A user logged onto computer using network credentials which was stored
locally on the computer.
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Hunting Suspicious Accounts
Start of session, Event ID 4624 and sessions ends, Event ID 4634 or 4647.
We would like to see if there are any unusual accounts logged into
machines with admin rights when it shouldn’t have admin rights or
hunting for local accounts being used to log into other machines
remotely, instead of using legitimate network accounts.
Some event logs might be local to the workstation but some might be on
the server, such as the domain controller, or whatever other machine
that was accessed.
We will be looking for Event ID 4625 (failed logon) and Logon Type 3
(network logon).
Of course we know the attacker can change the timing of each attempt.
The Event ID to hunt for is Event ID 4624 with Logon Type 3. We should
also look for the Logon Process to be NtLmSsP and the key length to be
set to 0.
For example, this is the case when a golden ticket is created. A golden
ticket is a forged Ticket-Granting Ticket that provides the attacker with
access to every network asset. You should therefore be familiar with
Kerberos-related Event IDs like 4768.
When hunting for RDP sessions we’re looking for Event IDs 4778 & 4779
with Logon Type 10 (Terminal Services or RDP). Also note the expected
Event IDs after successful or failed authentication attempts.
You can also check out resources from the Threat Hunting Project, here.
You can read more about this tool from the Sysinternals website, here.
You can check out resources from the Threat Hunting Project, here.
Other Event IDs specific to network shares are Event IDs 5140
and 5145.
You can also check out resources from the Threat Hunting
Project here, here, and here.
Attackers love nothing else like the concept of ‘living off the land.’
Event IDs to hunt for are 4104, 4105 & 4106. Refer to
PowerShell <3 the Blue Team blog post, here.
You can read more about the ELK Stack, including tutorials on
how to implement and use here.
You can read this article, here & here, to look at pros and
cons to both.
We have covered:
✓ What are event logs?
✓ What event logs we need to focus on when hunting.
✓ The importance of log forwarding, log rotation, and retention.
Hunting Lateral
Event ID 5145
Movement 1
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
Hunting Lateral Hunting Lateral
Movement 2 Movement 3
Hunting Lateral Windows Event
Movement 4 Forwarding
Windows Event
Event ID 1102
Collector