<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to identify an elusive process? (Help with investigating an IOC) in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479348#M58876</link>
    <description>&lt;P&gt;Hello Splunkers,&lt;BR /&gt;
I'm hoping to get some help investigating a potential IOC. &lt;/P&gt;

&lt;P&gt;Here is the situation, my Infosec app for Splunk (&lt;A href="https://splunkbase.splunk.com/app/4240/" target="_blank"&gt;https://splunkbase.splunk.com/app/4240/&lt;/A&gt;) dashboard has flagged a system for possible bruteforce attempt. I have identified the system (a workstation), the account name being attempted ("host"), the logon target (Domain) and some what of a pattern for attempts (2-3 attempts per 30 minute block and decreasing port number with each attempt for as long as the system is on regardless of whether or not a user is logged in). &lt;/P&gt;

&lt;P&gt;What I can't find out, is the process involved. (I can't figure out what is trying to login) I tried google searching for malware that has this same behavior but didn't find anything. I have used "TcpLogView" in an attempt to log the process that is opening the port but, it seems that it opens and closes too quickly for TcpLogView to see it, as the ports listed in the events are not listed by TcpLogView. I have even installed Splunk forwarder on this workstation to gain some visibility but I don't know if I'm ingesting the right data.&lt;/P&gt;

&lt;P&gt;So, how can I identify what is making the attempts?&lt;BR /&gt;
Thank you in advance for any help or suggestions.&lt;/P&gt;

&lt;P&gt;Update: These login attempts continue even if the system is running in safemode (with networking).&lt;/P&gt;

&lt;P&gt;Here is a log entry showing the failed attempt with ##comments and some *redaction. This event was generated by the DC.&lt;BR /&gt;
09/10/2019 02:31:04 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4768&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=*DC-Name&lt;BR /&gt;
TaskCategory=Kerberos Authentication Service&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=3587264684&lt;BR /&gt;
Keywords=Audit Failure&lt;BR /&gt;
Message=A Kerberos authentication ticket (TGT) was requested.&lt;/P&gt;

&lt;P&gt;Account Information:&lt;BR /&gt;
    Account Name:       host&lt;BR /&gt;
    Supplied Realm Name:    *Domain-name&lt;BR /&gt;
    User ID:            NULL SID&lt;/P&gt;

&lt;P&gt;Service Information:&lt;BR /&gt;
    Service Name:       krbtgt/*Domain-name&lt;BR /&gt;
    Service ID:     NULL SID&lt;/P&gt;

&lt;P&gt;Network Information:&lt;BR /&gt;
    Client Address:     192.168.10.170  ##workstation's IP&lt;BR /&gt;
    Client Port:        53169&lt;/P&gt;

&lt;P&gt;Additional Information:&lt;BR /&gt;
    Ticket Options:     0x40800010&lt;BR /&gt;
    Result Code:        0x6 ##Client not found in Kerberos database&lt;BR /&gt;
    Ticket Encryption Type: 0xFFFFFFFF&lt;BR /&gt;
    Pre-Authentication Type:    -&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 02:10:01 GMT</pubDate>
    <dc:creator>eliasit</dc:creator>
    <dc:date>2020-09-30T02:10:01Z</dc:date>
    <item>
      <title>How to identify an elusive process? (Help with investigating an IOC)</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479348#M58876</link>
      <description>&lt;P&gt;Hello Splunkers,&lt;BR /&gt;
I'm hoping to get some help investigating a potential IOC. &lt;/P&gt;

&lt;P&gt;Here is the situation, my Infosec app for Splunk (&lt;A href="https://splunkbase.splunk.com/app/4240/" target="_blank"&gt;https://splunkbase.splunk.com/app/4240/&lt;/A&gt;) dashboard has flagged a system for possible bruteforce attempt. I have identified the system (a workstation), the account name being attempted ("host"), the logon target (Domain) and some what of a pattern for attempts (2-3 attempts per 30 minute block and decreasing port number with each attempt for as long as the system is on regardless of whether or not a user is logged in). &lt;/P&gt;

&lt;P&gt;What I can't find out, is the process involved. (I can't figure out what is trying to login) I tried google searching for malware that has this same behavior but didn't find anything. I have used "TcpLogView" in an attempt to log the process that is opening the port but, it seems that it opens and closes too quickly for TcpLogView to see it, as the ports listed in the events are not listed by TcpLogView. I have even installed Splunk forwarder on this workstation to gain some visibility but I don't know if I'm ingesting the right data.&lt;/P&gt;

&lt;P&gt;So, how can I identify what is making the attempts?&lt;BR /&gt;
Thank you in advance for any help or suggestions.&lt;/P&gt;

&lt;P&gt;Update: These login attempts continue even if the system is running in safemode (with networking).&lt;/P&gt;

&lt;P&gt;Here is a log entry showing the failed attempt with ##comments and some *redaction. This event was generated by the DC.&lt;BR /&gt;
09/10/2019 02:31:04 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4768&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=*DC-Name&lt;BR /&gt;
TaskCategory=Kerberos Authentication Service&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=3587264684&lt;BR /&gt;
Keywords=Audit Failure&lt;BR /&gt;
Message=A Kerberos authentication ticket (TGT) was requested.&lt;/P&gt;

&lt;P&gt;Account Information:&lt;BR /&gt;
    Account Name:       host&lt;BR /&gt;
    Supplied Realm Name:    *Domain-name&lt;BR /&gt;
    User ID:            NULL SID&lt;/P&gt;

&lt;P&gt;Service Information:&lt;BR /&gt;
    Service Name:       krbtgt/*Domain-name&lt;BR /&gt;
    Service ID:     NULL SID&lt;/P&gt;

&lt;P&gt;Network Information:&lt;BR /&gt;
    Client Address:     192.168.10.170  ##workstation's IP&lt;BR /&gt;
    Client Port:        53169&lt;/P&gt;

&lt;P&gt;Additional Information:&lt;BR /&gt;
    Ticket Options:     0x40800010&lt;BR /&gt;
    Result Code:        0x6 ##Client not found in Kerberos database&lt;BR /&gt;
    Ticket Encryption Type: 0xFFFFFFFF&lt;BR /&gt;
    Pre-Authentication Type:    -&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 02:10:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479348#M58876</guid>
      <dc:creator>eliasit</dc:creator>
      <dc:date>2020-09-30T02:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to identify an elusive process? (Help with investigating an IOC)</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479349#M58877</link>
      <description>&lt;P&gt;So this really depends on what type of logs you are ingesting into Splunk. If you have endpoint protection logs, such as crowdstrike or carbon black, you can use these to correlate processes being run on the machine. If sysmon is being utilized, these logs can also be very helpful. If the only logs you are ingesting from the device are standard windows logs, then this can be a bit tricky as Splunk is only aware of the data being sent to it (which in this case doesn't look to be processes running on the device). In that case, you may have to manually investigate the device. Autoruns64 from sysinternals is a handy tool to use as most malware will show on startup for persistence. &lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 03:41:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479349#M58877</guid>
      <dc:creator>zacharychristen</dc:creator>
      <dc:date>2019-09-11T03:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to identify an elusive process? (Help with investigating an IOC)</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479350#M58878</link>
      <description>&lt;P&gt;Just to add to the great points @zacharychristensen made - the InfoSec app has basic endpoint data analytics capabilities (in the latest version 1.4 under Search &amp;gt; Experimental Dashboards &amp;gt; Endpoints). Data from endpoint solutions like Sysmon, osquery, CarbonBlack, CrowdStrike will show up there as long as the data is onboarded in a CIM-compliant manner (typically with a CIM-compliant add-on from Splunkbase). &lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 17:58:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479350#M58878</guid>
      <dc:creator>igifrin_splunk</dc:creator>
      <dc:date>2019-09-11T17:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to identify an elusive process? (Help with investigating an IOC)</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479351#M58879</link>
      <description>&lt;P&gt;@zacharychristensen  @igifrin_splunk Thank you both for your responses. I was not ingesting sysmon data before so I have started the DSOG for that. I hope to have the bugs worked by next week. &lt;BR /&gt;
Thanks again&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2019 23:50:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479351#M58879</guid>
      <dc:creator>eliasit</dc:creator>
      <dc:date>2019-09-17T23:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to identify an elusive process? (Help with investigating an IOC)</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479352#M58880</link>
      <description>&lt;P&gt;@zacharychristensen @igifrin_splunk&lt;/P&gt;

&lt;P&gt;Hello again splunkers,&lt;BR /&gt;
Still stuck on this one.&lt;BR /&gt;
So I have sysmon data coming in and can see processes making network connections in the sysmon events but there are no sysmon events for the ports listed in the Windows security log entries for the same time periods.&lt;/P&gt;

&lt;P&gt;For example, here is the search I used with the time picker set to last 60 minutes.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;tag=authentication  Keywords="Audit Failure"  Account_Name=host src=192.168.10.170
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This returns security log events as shown in the original post with different port numbers. (53475, 53476, 53477, 53478, 53479, 53480, 53481, 53482, 56153, 56154)&lt;/P&gt;

&lt;P&gt;But when I search the sysmon data for those ports during the same time frame I get no results.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational" EventCode=3 SourceIp=192.168.10.170 SourcePort=53480
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Am I doing something wrong? Or do I need to ingest other data?&lt;/P&gt;

&lt;P&gt;Thanks for any help you can offer.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 19:33:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479352#M58880</guid>
      <dc:creator>eliasit</dc:creator>
      <dc:date>2019-10-21T19:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to identify an elusive process? (Help with investigating an IOC)</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479353#M58881</link>
      <description>&lt;P&gt;Are you ingesting logs from the source IP that is causing the failures? Or are you just logging the events on the DC?&lt;/P&gt;

&lt;P&gt;Also, are these attempts occurring outside of normal business hours? How frequent are they occurring? These types of failures could often indicate some type of misconfiguration that needs to be updated. It is difficult to tell without knowing all the contextual information.&lt;/P&gt;

&lt;P&gt;I would always error on saying, yes, provide more visibility through other data sources, but that comes at a cost. &lt;/P&gt;

&lt;P&gt;I would probably start on the device that is causing the failures (I think this would be the workstation sitting at 192.168.10.170 from your example), is there any other anomalous activity occurring with this device? Have you scanned the device with an AV scanner? Does the device also have many local login failures? (event 4625 I believe). Do you have endpoint protection software installed on the device? Are there other devices that are generating a similar error? &lt;/P&gt;

&lt;P&gt;Visibility is key, and if you don't currently have the ability to monitor that device directly, it may be worth it to investigate the machine manually. If there is higher suspicion that this is an actual offense, pull it from the network and perform scans on the device. &lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2019 01:28:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479353#M58881</guid>
      <dc:creator>zacharychristen</dc:creator>
      <dc:date>2019-10-25T01:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to identify an elusive process? (Help with investigating an IOC)</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479354#M58882</link>
      <description>&lt;P&gt;@zacharychristensen &lt;BR /&gt;
Thanks for the response.&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;Are you ingesting logs from the source&lt;BR /&gt;
IP that is causing the failures?&lt;/P&gt;

&lt;P&gt;Yes, both windows security logs and sysmon logs. (from several workstations)&lt;/P&gt;

&lt;P&gt;Also, are these attempts occurring&lt;BR /&gt;
outside of normal business hours? &lt;BR /&gt;
How frequent are they occurring?&lt;/P&gt;

&lt;P&gt;They happen whenever the system is on, whether a user is logged in or not and about every 30 minutes. Also, they happen even if the system is booted in safemode (with networking).&lt;/P&gt;

&lt;P&gt;I would always error on saying, yes,&lt;BR /&gt;
provide more visibility through other&lt;BR /&gt;
data sources,...&lt;/P&gt;

&lt;P&gt;What would you recommend?&lt;/P&gt;

&lt;P&gt;Is there any other anomalous activity&lt;BR /&gt;
occurring with this device?&lt;/P&gt;

&lt;P&gt;Not that we have noticed.&lt;/P&gt;

&lt;P&gt;Have you scanned the device with an AV&lt;BR /&gt;
scanner?&lt;BR /&gt;
Yes, it comes back clean and the AV software also scans on access.&lt;BR /&gt;
Does the device also have many local&lt;BR /&gt;
login failures? (event 4625 I&lt;BR /&gt;
believe).&lt;/P&gt;

&lt;P&gt;No. And you are correct, EventID 4625.&lt;/P&gt;

&lt;P&gt;Do you have endpoint protection&lt;BR /&gt;
software installed on the device?&lt;/P&gt;

&lt;P&gt;No.&lt;/P&gt;

&lt;P&gt;Are there other devices that are&lt;BR /&gt;
generating a similar error?&lt;/P&gt;

&lt;P&gt;Yes. 2 other workstations. Of the 3 total workstations, 2 are used regularly (at the employee's desk) and one is used in a conference room but most of the time it is off unless I'm doing Windows updates to it.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;Also, I don't know if it matters but this domain was originally a Windows 2003 domain that was not raised to 2008 domain level until 2018 and then 2012 domain level in 2019. The domain has never been recreated from scratch. (I.E. Potential misconfigurations could have been piling up for years.)&lt;/P&gt;

&lt;P&gt;Thanks again&lt;/P&gt;

&lt;P&gt;Edit: fixed formatting&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2019 19:12:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-identify-an-elusive-process-Help-with-investigating-an/m-p/479354#M58882</guid>
      <dc:creator>eliasit</dc:creator>
      <dc:date>2019-10-29T19:12:40Z</dc:date>
    </item>
  </channel>
</rss>

