NetNTLM Downgrade Attack - Registry

Detects NetNTLM downgrade attack

Sigma rule (View on GitHub)

 1title: NetNTLM Downgrade Attack - Registry
 2id: d67572a0-e2ec-45d6-b8db-c100d14b8ef2
 3status: test
 4description: Detects NetNTLM downgrade attack
 5references:
 6    - https://web.archive.org/web/20171113231705/https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
 7author: Florian Roth (Nextron Systems), wagga
 8date: 2018/03/20
 9modified: 2022/11/29
10tags:
11    - attack.defense_evasion
12    - attack.t1562.001
13    - attack.t1112
14logsource:
15    product: windows
16    category: registry_event
17detection:
18    selection:
19        TargetObject|contains|all:
20            - 'SYSTEM\'
21            - 'ControlSet'
22            - '\Control\Lsa'
23        TargetObject|endswith:
24            - '\lmcompatibilitylevel'
25            - '\NtlmMinClientSec'
26            - '\RestrictSendingNTLMTraffic'
27    condition: selection
28falsepositives:
29    - Unknown
30level: high

References

Related rules

to-top