Addition of SID History to Active Directory Object
An attacker can use the SID history attribute to gain additional privileges.
Sigma rule (View on GitHub)
1title: Addition of SID History to Active Directory Object
2id: 2632954e-db1c-49cb-9936-67d1ef1d17d2
3status: stable
4description: An attacker can use the SID history attribute to gain additional privileges.
5references:
6 - https://adsecurity.org/?p=1772
7author: Thomas Patzke, @atc_project (improvements)
8date: 2017-02-19
9tags:
10 - attack.persistence
11 - attack.privilege-escalation
12 - attack.t1134.005
13logsource:
14 product: windows
15 service: security
16detection:
17 selection1:
18 EventID:
19 - 4765
20 - 4766
21 selection2:
22 EventID: 4738
23 selection3:
24 SidHistory:
25 - '-'
26 - '%%1793'
27 filter_null:
28 SidHistory:
29 condition: selection1 or (selection2 and not selection3 and not filter_null)
30falsepositives:
31 - Migration of an account into a new domain
32level: medium
References
Related rules
- Abuse of Service Permissions to Hide Services Via Set-Service
- Abuse of Service Permissions to Hide Services Via Set-Service - PS
- Account Tampering - Suspicious Failed Logon Reasons
- Activity From Anonymous IP Address
- App Granted Privileged Delegated Or App Permissions