Skip to content

Commit acc2d51

Browse files
Samirbousgithub-actions[bot]
authored andcommitted
[New] Untrusted DLL Loaded by Azure AD Sync Service (#4151)
* Create credential_access_imageload_azureadconnectauthsvc.toml * Update credential_access_imageload_azureadconnectauthsvc.toml * Update rules/windows/credential_access_imageload_azureadconnectauthsvc.toml Co-authored-by: Jonhnathan <[email protected]> * Update rules/windows/credential_access_imageload_azureadconnectauthsvc.toml Co-authored-by: Jonhnathan <[email protected]> * Update rules/windows/credential_access_imageload_azureadconnectauthsvc.toml Co-authored-by: Jonhnathan <[email protected]> --------- Co-authored-by: Jonhnathan <[email protected]> (cherry picked from commit 8404d41)
1 parent 81266ea commit acc2d51

File tree

1 file changed

+68
-0
lines changed

1 file changed

+68
-0
lines changed
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
[metadata]
2+
creation_date = "2024/10/14"
3+
integration = ["endpoint", "windows"]
4+
maturity = "production"
5+
updated_date = "2024/10/14"
6+
7+
[rule]
8+
author = ["Elastic", "Matteo Potito Giorgio"]
9+
description = """
10+
Identifies the load of a DLL without a valid code signature by the Azure AD Sync process, which may indicate an attempt
11+
to persist or collect sensitive credentials passing through the Azure AD synchronization server.
12+
"""
13+
from = "now-9m"
14+
index = ["winlogbeat-*", "logs-endpoint.events.library*", "logs-windows.sysmon_operational-*"]
15+
language = "eql"
16+
license = "Elastic License v2"
17+
name = "Untrusted DLL Loaded by Azure AD Sync Service"
18+
references = [
19+
"https://blog.xpnsec.com/azuread-connect-for-redteam/",
20+
"https://medium.com/@breakingmhet/detect-azure-pass-through-authentication-abuse-azure-hybrid-environments-ed4274784252",
21+
"https://learn.microsoft.com/en-us/azure/active-directory/hybrid/tshoot-connect-pass-through-authentication"
22+
]
23+
risk_score = 73
24+
rule_id = "f909075d-afc7-42d7-b399-600b94352fd9"
25+
severity = "high"
26+
tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Credential Access", "Data Source: Elastic Defend", "Data Source: Sysmon"]
27+
timestamp_override = "event.ingested"
28+
type = "eql"
29+
30+
query = '''
31+
any where host.os.type == "windows" and process.name : "AzureADConnectAuthenticationAgentService.exe" and
32+
(
33+
(event.category == "library" and event.action == "load") or
34+
(event.category == "process" and event.action : "Image loaded*")
35+
) and
36+
37+
not (?dll.code_signature.trusted == true or file.code_signature.status == "Valid") and not
38+
39+
(
40+
/* Elastic defend DLL path */
41+
?dll.path :
42+
("?:\\Windows\\assembly\\NativeImages*",
43+
"?:\\Windows\\Microsoft.NET\\*",
44+
"?:\\Windows\\WinSxS\\*",
45+
"?:\\Windows\\System32\\DriverStore\\FileRepository\\*") or
46+
47+
/* Sysmon DLL path is mapped to file.path */
48+
file.path :
49+
("?:\\Windows\\assembly\\NativeImages*",
50+
"?:\\Windows\\Microsoft.NET\\*",
51+
"?:\\Windows\\WinSxS\\*",
52+
"?:\\Windows\\System32\\DriverStore\\FileRepository\\*")
53+
)
54+
'''
55+
56+
57+
[[rule.threat]]
58+
framework = "MITRE ATT&CK"
59+
[[rule.threat.technique]]
60+
id = "T1003"
61+
name = "OS Credential Dumping"
62+
reference = "https://attack.mitre.org/techniques/T1003/"
63+
64+
65+
[rule.threat.tactic]
66+
id = "TA0006"
67+
name = "Credential Access"
68+
reference = "https://attack.mitre.org/tactics/TA0006/"

0 commit comments

Comments
 (0)