NTLM Logon
Detects logons using NTLM, which could be caused by a legacy source or attackers
Sigma rule (View on GitHub)
1title: NTLM Logon
2id: 98c3bcf1-56f2-49dc-9d8d-c66cf190238b
3status: test
4description: Detects logons using NTLM, which could be caused by a legacy source or attackers
5references:
6 - https://twitter.com/JohnLaTwC/status/1004895028995477505
7author: Florian Roth (Nextron Systems)
8date: 2018-06-08
9modified: 2024-07-22
10tags:
11 - attack.lateral-movement
12 - attack.t1550.002
13logsource:
14 product: windows
15 service: ntlm
16 definition: Requires events from Microsoft-Windows-NTLM/Operational
17detection:
18 selection:
19 EventID: 8002
20 condition: selection
21falsepositives:
22 - Legacy hosts
23level: low
References
Related rules
- NTLMv1 Logon Between Client and Server
- Pass the Hash Activity 2
- Successful Overpass the Hash Attempt
- APT31 Judgement Panda Activity
- AWS Console GetSigninToken Potential Abuse