Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit 9ef093f

Browse files
authored
Create ImpersonatedUserFootprint.md
1 parent 5943590 commit 9ef093f

File tree

1 file changed

+57
-0
lines changed

1 file changed

+57
-0
lines changed
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
2+
# ImpersonatedUserFootprint
3+
4+
Azure ATP raises alert on suspicious Kerberos ticket, pointing to a potential overpass-the-hash attack.
5+
Once attackers gain credentials for a user with higher privileges, they will use the stolen credentials to sign into other devices and move laterally.
6+
This query finds related sign-in events following overpass-the-hash attack to trace the footprint of the impersonated user.
7+
8+
## Query
9+
10+
```
11+
AlertInfo
12+
| where ServiceSource == "Azure ATP"
13+
| where Title == "Suspected overpass-the-hash attack (Kerberos)"
14+
| extend AlertTime = Timestamp
15+
| join
16+
(
17+
AlertEvidence
18+
| where EntityType == "User"
19+
)
20+
on AlertId
21+
| distinct AlertTime,AccountSid
22+
| join kind=leftouter
23+
(
24+
DeviceLogonEvents
25+
| where LogonType == "Network" and ActionType == "LogonSuccess"
26+
| extend LogonTime = Timestamp
27+
)
28+
on AccountSid
29+
| where LogonTime between (AlertTime .. (AlertTime + 2h))
30+
| project DeviceId , AlertTime , AccountName , AccountSid
31+
```
32+
## Category
33+
34+
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
35+
36+
| Technique, tactic, or state | Covered? (v=yes) | Notes |
37+
|------------------------|----------|-------|
38+
| Initial access | | |
39+
| Execution | | |
40+
| Persistence | | |
41+
| Privilege escalation | | |
42+
| Defense evasion | | |
43+
| Credential Access | | |
44+
| Discovery | | |
45+
| Lateral movement | V | https://attack.mitre.org/techniques/T1550/002/ |
46+
| Collection | | |
47+
| Command and control | | |
48+
| Exfiltration | | |
49+
| Impact | | |
50+
| Vulnerability | | |
51+
| Misconfiguration | | |
52+
| Malware, component | | |
53+
54+
55+
## Contributor info
56+
57+
Microsoft threat protection team

0 commit comments

Comments
 (0)