Azure Active Directory Hybrid Health AD FS New Server
This detection uses azureactivity logs (Administrative category) to identify the creation or update of a server instance in an Azure AD Hybrid health AD FS service. A threat actor can create a new AD Health ADFS service and create a fake server instance to spoof AD FS signing logs. There is no need to compromise an on-prem AD FS server. This can be done programmatically via HTTP requests to Azure.
Sigma rule (View on GitHub)
1title: Azure Active Directory Hybrid Health AD FS New Server
2id: 288a39fc-4914-4831-9ada-270e9dc12cb4
3status: test
4description: |
5 This detection uses azureactivity logs (Administrative category) to identify the creation or update of a server instance in an Azure AD Hybrid health AD FS service.
6 A threat actor can create a new AD Health ADFS service and create a fake server instance to spoof AD FS signing logs. There is no need to compromise an on-prem AD FS server.
7 This can be done programmatically via HTTP requests to Azure.
8references:
9 - https://o365blog.com/post/hybridhealthagent/
10author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
11date: 2021-08-26
12modified: 2023-10-11
13tags:
14 - attack.defense-evasion
15 - attack.t1578
16logsource:
17 product: azure
18 service: activitylogs
19detection:
20 selection:
21 CategoryValue: 'Administrative'
22 ResourceProviderValue: 'Microsoft.ADHybridHealthService'
23 ResourceId|contains: 'AdFederationService'
24 OperationNameValue: 'Microsoft.ADHybridHealthService/services/servicemembers/action'
25 condition: selection
26falsepositives:
27 - Legitimate AD FS servers added to an AAD Health AD FS service instance
28level: medium
References
Related rules
- AD Object WriteDAC Access
- ADS Zone.Identifier Deleted By Uncommon Application
- AMSI Bypass Pattern Assembly GetType
- APT PRIVATELOG Image Load Pattern
- APT27 - Emissary Panda Activity