You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rules/windows/credential_access_dollar_account_relay.toml
+22-20Lines changed: 22 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -2,33 +2,32 @@
2
2
creation_date = "2024/07/24"
3
3
integration = ["system", "windows"]
4
4
maturity = "production"
5
-
updated_date = "2025/03/20"
5
+
updated_date = "2025/06/16"
6
6
7
7
[rule]
8
8
author = ["Elastic"]
9
9
description = """
10
-
Identifies potential relay attacks against a domain controller (DC) by identifying authentication events using the
11
-
domain controller computer account coming from other hosts to the DC that owns the account. Attackers may relay the DC
10
+
Identifies potential relay activities against a Computer account by identifying authentication events using the computer
11
+
account coming from from hosts other than the server that owns the account. Attackers may relay the computer account
12
12
hash after capturing it using forced authentication.
13
13
"""
14
14
from = "now-9m"
15
15
index = ["logs-system.security*", "logs-windows.forwarded*", "winlogbeat-*"]
16
16
language = "eql"
17
17
license = "Elastic License v2"
18
-
name = "Potential Relay Attack against a Domain Controller"
18
+
name = "Potential Computer Account Relay Activity"
19
19
note = """## Triage and analysis
20
20
21
21
> **Disclaimer**:
22
22
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
23
23
24
-
### Investigating Potential Relay Attack against a Domain Controller
25
-
26
-
Domain Controllers (DCs) are critical in managing authentication within Windows environments. Adversaries exploit this by capturing and relaying DC credentials, often using NTLM authentication, to gain unauthorized access. The detection rule identifies anomalies in authentication events, such as machine accounts logging in from unexpected hosts, indicating potential relay attacks. By analyzing network logon types and mismatched IP addresses, it flags suspicious activities, aiding in early threat detection.
- Review the authentication events with event codes 4624 and 4625 to identify any anomalies in logon attempts, focusing on those using NTLM authentication.
31
-
- Examine the source IP addresses of the suspicious authentication events to determine if they are external or unexpected within the network environment.
28
+
- Compare the source.ip to the target server host.ip addresses to make sure it's indeed a remote use of the machine account.
29
+
- Examine the source.ip activities as this is the attacker IP address used to relay.
30
+
- Review all relevant activities such as services creation, file and process events on the target server within the same period.
32
31
- Verify the machine account names that end with a dollar sign ($) to ensure they match the expected hostnames, and investigate any discrepancies.
33
32
- Check the network logon types to confirm if they align with typical usage patterns for the identified machine accounts.
34
33
- Investigate the context of the source IP addresses that do not match the host IP, looking for any signs of unauthorized access or unusual network activity.
@@ -42,15 +41,18 @@ Domain Controllers (DCs) are critical in managing authentication within Windows
42
41
- Temporary network reconfigurations or migrations might result in machine accounts appearing to log in from unexpected hosts. During such events, temporarily adjust the rule parameters or disable the rule to prevent unnecessary alerts.
43
42
- Regularly review and update the list of exceptions to ensure they reflect current network configurations and operational practices, minimizing the risk of overlooking genuine threats.
44
43
45
-
### Response and remediation
46
-
47
-
- Immediately isolate the affected domain controller from the network to prevent further unauthorized access and potential lateral movement by the attacker.
48
-
- Conduct a password reset for the domain controller's machine account and any other accounts that may have been compromised or are at risk, ensuring the use of strong, unique passwords.
49
-
- Review and analyze recent authentication logs and network traffic to identify any other potentially compromised systems or accounts, focusing on the source IP addresses flagged in the alert.
50
-
- Implement network segmentation to limit the ability of attackers to relay credentials between systems, particularly between domain controllers and other critical infrastructure.
51
-
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine the full scope of the breach.
52
-
- Deploy additional monitoring and detection mechanisms to identify similar relay attack patterns in the future, enhancing the detection capabilities for NTLM relay attacks.
53
-
- Conduct a post-incident review to identify any gaps in security controls and update policies or procedures to prevent recurrence, ensuring lessons learned are applied to improve overall security posture."""
44
+
### Response and Remediation
45
+
46
+
- Initiate the incident response process based on the outcome of the triage.
47
+
- Isolate the involved hosts to prevent further post-compromise behavior.
48
+
- If the involved server is a Domain Controller, coordinate the isolation of the server with infrastructure and identity teams to contain the threat while preserving service availability and forensic evidence. Prioritize this step if active compromise or attacker persistence is confirmed.
49
+
- Reset the domain controller's machine account password, along with any accounts suspected to be compromised or exposed. Ensure strong, unique credentials are used and apply tiered credential hygiene where applicable.
50
+
- Analyze recent authentication logs, event logs, and network traffic, focusing on suspicious activity and the source IPs referenced in the alert. Correlate findings to identify any lateral movement or additional compromised systems.
51
+
- Strengthen network segmentation, especially between domain controllers, administrative workstations, and critical infrastructure. This limits the attack surface and impedes credential relay or reuse across systems.
52
+
- Escalate the incident to the SOC or incident response team to coordinate a full investigation, containment, and recovery plan. Ensure stakeholders are kept informed throughout the response.
53
+
- Enhance detection mechanisms by tuning alerts and deploying additional telemetry focused on credential relay patterns, anomalous authentication, and NTLM-related activity.
54
+
- Conduct a structured post-incident review, documenting findings, identifying control gaps, and updating playbooks, configurations, or security policies to reduce the likelihood of similar incidents in the future.
0 commit comments