Account Password Reset Remotely

Identifies an attempt to reset a potentially privileged account password remotely. Adversaries may manipulate account passwords to maintain access or evade password duration policies and preserve compromised credentials.

Elastic rule (View on GitHub)

  1[metadata]
  2creation_date = "2021/10/18"
  3integration = ["system", "windows"]
  4maturity = "production"
  5updated_date = "2025/01/15"
  6min_stack_version = "8.14.0"
  7min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
  8
  9[rule]
 10author = ["Elastic"]
 11description = """
 12Identifies an attempt to reset a potentially privileged account password remotely. Adversaries may manipulate account
 13passwords to maintain access or evade password duration policies and preserve compromised credentials.
 14"""
 15false_positives = ["Legitimate remote account administration."]
 16from = "now-9m"
 17index = ["winlogbeat-*", "logs-system.security*", "logs-windows.forwarded*"]
 18language = "eql"
 19license = "Elastic License v2"
 20name = "Account Password Reset Remotely"
 21note = """## Triage and analysis
 22
 23> **Disclaimer**:
 24> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
 25
 26### Investigating Account Password Reset Remotely
 27
 28Remote password resets are crucial for managing user accounts, especially for privileged users. However, adversaries exploit this by resetting passwords to maintain unauthorized access or bypass security policies. The detection rule identifies suspicious remote password resets by monitoring successful network logins and subsequent password reset actions, focusing on privileged accounts to minimize noise and highlight potential threats.
 29
 30### Possible investigation steps
 31
 32- Review the source IP address from the authentication event to determine if it is from a known or trusted network. Investigate any unfamiliar or suspicious IP addresses.
 33- Check the winlog.event_data.TargetUserName from the password reset event to confirm if it belongs to a privileged account and verify if the reset was authorized.
 34- Correlate the winlog.event_data.SubjectLogonId from both the authentication and password reset events to ensure they are linked and identify the user or process responsible for the actions.
 35- Investigate the timing and frequency of similar events to identify patterns or anomalies that may indicate malicious activity.
 36- Examine any recent changes or activities associated with the account in question to assess if there are other signs of compromise or unauthorized access.
 37
 38### False positive analysis
 39
 40- Routine administrative tasks can trigger false positives when legitimate IT staff reset passwords for maintenance or support. To manage this, create exceptions for known IT personnel or service accounts that frequently perform these actions.
 41- Automated scripts or tools used for account management might cause false alerts. Identify and exclude these scripts or tools by their specific account names or IP addresses.
 42- Scheduled password resets for compliance or security policies may appear suspicious. Document and exclude these scheduled tasks by their timing and associated accounts.
 43- Service accounts with naming conventions similar to privileged accounts might be flagged. Review and adjust the rule to exclude these specific service accounts by refining the naming patterns in the query.
 44- Internal network devices or systems that perform regular password resets could be misinterpreted as threats. Whitelist these devices by their IP addresses or hostnames to reduce noise.
 45
 46### Response and remediation
 47
 48- Immediately isolate the affected system from the network to prevent further unauthorized access or lateral movement by the adversary.
 49- Revoke any active sessions associated with the compromised account to disrupt any ongoing malicious activities.
 50- Reset the password of the affected account using a secure method, ensuring it is done from a trusted and secure system.
 51- Conduct a thorough review of recent account activities and system logs to identify any additional unauthorized changes or access attempts.
 52- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine the scope of the breach.
 53- Implement additional monitoring on the affected account and related systems to detect any further suspicious activities.
 54- Review and update access controls and privileged account management policies to prevent similar incidents in the future.
 55
 56## Performance
 57This rule may cause medium to high performance impact due to logic scoping all remote Windows logon activity.
 58"""
 59references = [
 60    "https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4724",
 61    "https://stealthbits.com/blog/manipulating-user-passwords-with-mimikatz/",
 62    "https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES/blob/master/Credential%20Access/remote_pwd_reset_rpc_mimikatz_postzerologon_target_DC.evtx",
 63    "https://www.elastic.co/security-labs/detect-credential-access",
 64]
 65risk_score = 47
 66rule_id = "2820c9c2-bcd7-4d6e-9eba-faf3891ba450"
 67severity = "medium"
 68tags = [
 69    "Domain: Endpoint",
 70    "OS: Windows",
 71    "Use Case: Threat Detection",
 72    "Tactic: Persistence",
 73    "Tactic: Impact",
 74    "Data Source: System",
 75    "Resources: Investigation Guide",
 76]
 77type = "eql"
 78
 79query = '''
 80sequence by winlog.computer_name with maxspan=1m
 81  [authentication where event.action == "logged-in" and
 82    /* event 4624 need to be logged */
 83    winlog.logon.type : "Network" and event.outcome == "success" and source.ip != null and
 84    source.ip != "127.0.0.1" and source.ip != "::1" and
 85    not winlog.event_data.TargetUserName : ("svc*", "PIM_*", "_*_", "*-*-*", "*$")] by winlog.event_data.TargetLogonId
 86   /* event 4724 need to be logged */
 87  [iam where event.action == "reset-password" and
 88   (
 89    /*
 90       This rule is very noisy if not scoped to privileged accounts, duplicate the
 91       rule and add your own naming convention and accounts of interest here.
 92     */
 93    winlog.event_data.TargetUserName: ("*Admin*", "*super*", "*SVC*", "*DC0*", "*service*", "*DMZ*", "*ADM*") or
 94    winlog.event_data.TargetSid : ("S-1-5-21-*-500", "S-1-12-1-*-500")
 95    )
 96  ] by winlog.event_data.SubjectLogonId
 97'''
 98
 99
100[[rule.threat]]
101framework = "MITRE ATT&CK"
102[[rule.threat.technique]]
103id = "T1098"
104name = "Account Manipulation"
105reference = "https://attack.mitre.org/techniques/T1098/"
106
107
108[rule.threat.tactic]
109id = "TA0003"
110name = "Persistence"
111reference = "https://attack.mitre.org/tactics/TA0003/"
112[[rule.threat]]
113framework = "MITRE ATT&CK"
114[[rule.threat.technique]]
115id = "T1531"
116name = "Account Access Removal"
117reference = "https://attack.mitre.org/techniques/T1531/"
118
119
120[rule.threat.tactic]
121id = "TA0040"
122name = "Impact"
123reference = "https://attack.mitre.org/tactics/TA0040/"

Triage and analysis

Disclaimer: This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.

Investigating Account Password Reset Remotely

Remote password resets are crucial for managing user accounts, especially for privileged users. However, adversaries exploit this by resetting passwords to maintain unauthorized access or bypass security policies. The detection rule identifies suspicious remote password resets by monitoring successful network logins and subsequent password reset actions, focusing on privileged accounts to minimize noise and highlight potential threats.

Possible investigation steps

  • Review the source IP address from the authentication event to determine if it is from a known or trusted network. Investigate any unfamiliar or suspicious IP addresses.
  • Check the winlog.event_data.TargetUserName from the password reset event to confirm if it belongs to a privileged account and verify if the reset was authorized.
  • Correlate the winlog.event_data.SubjectLogonId from both the authentication and password reset events to ensure they are linked and identify the user or process responsible for the actions.
  • Investigate the timing and frequency of similar events to identify patterns or anomalies that may indicate malicious activity.
  • Examine any recent changes or activities associated with the account in question to assess if there are other signs of compromise or unauthorized access.

False positive analysis

  • Routine administrative tasks can trigger false positives when legitimate IT staff reset passwords for maintenance or support. To manage this, create exceptions for known IT personnel or service accounts that frequently perform these actions.
  • Automated scripts or tools used for account management might cause false alerts. Identify and exclude these scripts or tools by their specific account names or IP addresses.
  • Scheduled password resets for compliance or security policies may appear suspicious. Document and exclude these scheduled tasks by their timing and associated accounts.
  • Service accounts with naming conventions similar to privileged accounts might be flagged. Review and adjust the rule to exclude these specific service accounts by refining the naming patterns in the query.
  • Internal network devices or systems that perform regular password resets could be misinterpreted as threats. Whitelist these devices by their IP addresses or hostnames to reduce noise.

Response and remediation

  • Immediately isolate the affected system from the network to prevent further unauthorized access or lateral movement by the adversary.
  • Revoke any active sessions associated with the compromised account to disrupt any ongoing malicious activities.
  • Reset the password of the affected account using a secure method, ensuring it is done from a trusted and secure system.
  • Conduct a thorough review of recent account activities and system logs to identify any additional unauthorized changes or access attempts.
  • Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine the scope of the breach.
  • Implement additional monitoring on the affected account and related systems to detect any further suspicious activities.
  • Review and update access controls and privileged account management policies to prevent similar incidents in the future.

Performance

This rule may cause medium to high performance impact due to logic scoping all remote Windows logon activity.

References

Related rules

to-top