Account Password Reset Remotely
Identifies an attempt to reset a potentially privileged account password remotely. Adversaries may manipulate account passwords to maintain access or evade password duration policies and preserve compromised credentials.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2021/10/18"
3integration = ["system", "windows"]
4maturity = "production"
5updated_date = "2025/01/15"
6min_stack_version = "8.14.0"
7min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
8
9[rule]
10author = ["Elastic"]
11description = """
12Identifies an attempt to reset a potentially privileged account password remotely. Adversaries may manipulate account
13passwords to maintain access or evade password duration policies and preserve compromised credentials.
14"""
15false_positives = ["Legitimate remote account administration."]
16from = "now-9m"
17index = ["winlogbeat-*", "logs-system.security*", "logs-windows.forwarded*"]
18language = "eql"
19license = "Elastic License v2"
20name = "Account Password Reset Remotely"
21note = """## Triage and analysis
22
23> **Disclaimer**:
24> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
25
26### Investigating Account Password Reset Remotely
27
28Remote password resets are crucial for managing user accounts, especially for privileged users. However, adversaries exploit this by resetting passwords to maintain unauthorized access or bypass security policies. The detection rule identifies suspicious remote password resets by monitoring successful network logins and subsequent password reset actions, focusing on privileged accounts to minimize noise and highlight potential threats.
29
30### Possible investigation steps
31
32- Review the source IP address from the authentication event to determine if it is from a known or trusted network. Investigate any unfamiliar or suspicious IP addresses.
33- Check the winlog.event_data.TargetUserName from the password reset event to confirm if it belongs to a privileged account and verify if the reset was authorized.
34- Correlate the winlog.event_data.SubjectLogonId from both the authentication and password reset events to ensure they are linked and identify the user or process responsible for the actions.
35- Investigate the timing and frequency of similar events to identify patterns or anomalies that may indicate malicious activity.
36- Examine any recent changes or activities associated with the account in question to assess if there are other signs of compromise or unauthorized access.
37
38### False positive analysis
39
40- Routine administrative tasks can trigger false positives when legitimate IT staff reset passwords for maintenance or support. To manage this, create exceptions for known IT personnel or service accounts that frequently perform these actions.
41- Automated scripts or tools used for account management might cause false alerts. Identify and exclude these scripts or tools by their specific account names or IP addresses.
42- Scheduled password resets for compliance or security policies may appear suspicious. Document and exclude these scheduled tasks by their timing and associated accounts.
43- Service accounts with naming conventions similar to privileged accounts might be flagged. Review and adjust the rule to exclude these specific service accounts by refining the naming patterns in the query.
44- Internal network devices or systems that perform regular password resets could be misinterpreted as threats. Whitelist these devices by their IP addresses or hostnames to reduce noise.
45
46### Response and remediation
47
48- Immediately isolate the affected system from the network to prevent further unauthorized access or lateral movement by the adversary.
49- Revoke any active sessions associated with the compromised account to disrupt any ongoing malicious activities.
50- Reset the password of the affected account using a secure method, ensuring it is done from a trusted and secure system.
51- Conduct a thorough review of recent account activities and system logs to identify any additional unauthorized changes or access attempts.
52- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine the scope of the breach.
53- Implement additional monitoring on the affected account and related systems to detect any further suspicious activities.
54- Review and update access controls and privileged account management policies to prevent similar incidents in the future.
55
56## Performance
57This rule may cause medium to high performance impact due to logic scoping all remote Windows logon activity.
58"""
59references = [
60 "https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4724",
61 "https://stealthbits.com/blog/manipulating-user-passwords-with-mimikatz/",
62 "https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES/blob/master/Credential%20Access/remote_pwd_reset_rpc_mimikatz_postzerologon_target_DC.evtx",
63 "https://www.elastic.co/security-labs/detect-credential-access",
64]
65risk_score = 47
66rule_id = "2820c9c2-bcd7-4d6e-9eba-faf3891ba450"
67severity = "medium"
68tags = [
69 "Domain: Endpoint",
70 "OS: Windows",
71 "Use Case: Threat Detection",
72 "Tactic: Persistence",
73 "Tactic: Impact",
74 "Data Source: System",
75 "Resources: Investigation Guide",
76]
77type = "eql"
78
79query = '''
80sequence by winlog.computer_name with maxspan=1m
81 [authentication where event.action == "logged-in" and
82 /* event 4624 need to be logged */
83 winlog.logon.type : "Network" and event.outcome == "success" and source.ip != null and
84 source.ip != "127.0.0.1" and source.ip != "::1" and
85 not winlog.event_data.TargetUserName : ("svc*", "PIM_*", "_*_", "*-*-*", "*$")] by winlog.event_data.TargetLogonId
86 /* event 4724 need to be logged */
87 [iam where event.action == "reset-password" and
88 (
89 /*
90 This rule is very noisy if not scoped to privileged accounts, duplicate the
91 rule and add your own naming convention and accounts of interest here.
92 */
93 winlog.event_data.TargetUserName: ("*Admin*", "*super*", "*SVC*", "*DC0*", "*service*", "*DMZ*", "*ADM*") or
94 winlog.event_data.TargetSid : ("S-1-5-21-*-500", "S-1-12-1-*-500")
95 )
96 ] by winlog.event_data.SubjectLogonId
97'''
98
99
100[[rule.threat]]
101framework = "MITRE ATT&CK"
102[[rule.threat.technique]]
103id = "T1098"
104name = "Account Manipulation"
105reference = "https://attack.mitre.org/techniques/T1098/"
106
107
108[rule.threat.tactic]
109id = "TA0003"
110name = "Persistence"
111reference = "https://attack.mitre.org/tactics/TA0003/"
112[[rule.threat]]
113framework = "MITRE ATT&CK"
114[[rule.threat.technique]]
115id = "T1531"
116name = "Account Access Removal"
117reference = "https://attack.mitre.org/techniques/T1531/"
118
119
120[rule.threat.tactic]
121id = "TA0040"
122name = "Impact"
123reference = "https://attack.mitre.org/tactics/TA0040/"
Triage and analysis
Disclaimer: This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
Investigating Account Password Reset Remotely
Remote password resets are crucial for managing user accounts, especially for privileged users. However, adversaries exploit this by resetting passwords to maintain unauthorized access or bypass security policies. The detection rule identifies suspicious remote password resets by monitoring successful network logins and subsequent password reset actions, focusing on privileged accounts to minimize noise and highlight potential threats.
Possible investigation steps
- Review the source IP address from the authentication event to determine if it is from a known or trusted network. Investigate any unfamiliar or suspicious IP addresses.
- Check the winlog.event_data.TargetUserName from the password reset event to confirm if it belongs to a privileged account and verify if the reset was authorized.
- Correlate the winlog.event_data.SubjectLogonId from both the authentication and password reset events to ensure they are linked and identify the user or process responsible for the actions.
- Investigate the timing and frequency of similar events to identify patterns or anomalies that may indicate malicious activity.
- Examine any recent changes or activities associated with the account in question to assess if there are other signs of compromise or unauthorized access.
False positive analysis
- Routine administrative tasks can trigger false positives when legitimate IT staff reset passwords for maintenance or support. To manage this, create exceptions for known IT personnel or service accounts that frequently perform these actions.
- Automated scripts or tools used for account management might cause false alerts. Identify and exclude these scripts or tools by their specific account names or IP addresses.
- Scheduled password resets for compliance or security policies may appear suspicious. Document and exclude these scheduled tasks by their timing and associated accounts.
- Service accounts with naming conventions similar to privileged accounts might be flagged. Review and adjust the rule to exclude these specific service accounts by refining the naming patterns in the query.
- Internal network devices or systems that perform regular password resets could be misinterpreted as threats. Whitelist these devices by their IP addresses or hostnames to reduce noise.
Response and remediation
- Immediately isolate the affected system from the network to prevent further unauthorized access or lateral movement by the adversary.
- Revoke any active sessions associated with the compromised account to disrupt any ongoing malicious activities.
- Reset the password of the affected account using a secure method, ensuring it is done from a trusted and secure system.
- Conduct a thorough review of recent account activities and system logs to identify any additional unauthorized changes or access attempts.
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine the scope of the breach.
- Implement additional monitoring on the affected account and related systems to detect any further suspicious activities.
- Review and update access controls and privileged account management policies to prevent similar incidents in the future.
Performance
This rule may cause medium to high performance impact due to logic scoping all remote Windows logon activity.
References
Related rules
- A scheduled task was created
- A scheduled task was updated
- Active Directory Group Modification by SYSTEM
- New ActiveSyncAllowedDeviceID Added via PowerShell
- Persistence via TelemetryController Scheduled Task Hijack