<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to Detect Pass the Hash in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486973#M193768</link>
    <description>&lt;P&gt;working on the same thing, just want to share some ideas.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;index=wineventlog EventCode=4624 Logon_Type=9 Authentication_Package=Negotiate Logon_Process=seclogo&lt;BR /&gt;
index=wineventlog Logon_Process=Seclogo Logon_Type!=2&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;I recommend you read this first:&lt;BR /&gt;
&lt;A href="https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/" target="_blank"&gt;https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;According to this article, you can see the "logon_type=9"and "Logon_Process=seclogo" will show up in the event log of the source host.&lt;BR /&gt;
I did some PTH POC and I agree with this article.&lt;BR /&gt;
Imagine a users laptop was compromised, he is trying PTH everywhere in your network.&lt;BR /&gt;
Usually we don't collect wineventlog on a laptop right? So this rule won't fire in this scenario.&lt;/P&gt;

&lt;P&gt;My observation is, if a PTH is success in your network, you will see 3 winevent log on the target host  at the SAME TIME (eventcode=4672+eventcode=4624+eventcode=5140)&lt;BR /&gt;
Try write a search based on this idea?&lt;BR /&gt;
The defect is, the rule will fire only when the PTH is already success, can't detection PTH attempt.&lt;BR /&gt;
That's all i have man...Please let me know your method if this is been resolved!&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 04:22:34 GMT</pubDate>
    <dc:creator>jiangzhaohua</dc:creator>
    <dc:date>2020-09-30T04:22:34Z</dc:date>
    <item>
      <title>How to Detect Pass the Hash</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486969#M193764</link>
      <description>&lt;P&gt;Hello there! I am trying to build a Splunk alert to detect Pass the Hash. In another post it was recommended to try using the searches below. I tested out the searches but they yield some false positives. I wanted to re-post here and see if anyone has any other other recommendations besides the searches below?&lt;/P&gt;

&lt;P&gt;index=wineventlog EventCode=4624 Logon_Type=9 Authentication_Package=Negotiate Logon_Process=seclogo&lt;/P&gt;

&lt;P&gt;index=wineventlog Logon_Process=Seclogo Logon_Type!=2&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:01:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486969#M193764</guid>
      <dc:creator>johann2017</dc:creator>
      <dc:date>2020-09-30T03:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to Detect Pass the Hash</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486970#M193765</link>
      <description>&lt;P&gt;&lt;A href="https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/"&gt;HOW TO DETECT PASS-THE-HASH ATTACKS&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;QueryList&amp;gt;
  &amp;lt;Query Id="0" Path="Security"&amp;gt;
    &amp;lt;Select Path="Security"&amp;gt;
     *[System[(EventID='4624')]
      and
     EventData[Data[@Name='LogonType']='9']
      and
     EventData[Data[@Name='LogonProcessName']='seclogo']
     and
     EventData[Data[@Name='AuthenticationPackageName']='Negotiate']
     ]
     &amp;lt;/Select&amp;gt;
  &amp;lt;/Query&amp;gt;
  &amp;lt;Query Id="0" Path="Microsoft-Windows-Sysmon/Operational"&amp;gt;
    &amp;lt;Select Path="Microsoft-Windows-Sysmon/Operational"&amp;gt;
    *[System[(EventID=10)]]
    and
    *[EventData[Data[@Name='GrantedAccess'] and (Data='0x1010' or Data='0x1038')]]
&amp;lt;/Select&amp;gt;
  &amp;lt;/Query&amp;gt;
&amp;lt;/QueryList&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;EM&gt;Microsoft-Windows-Sysmon/Operational&lt;/EM&gt; is necessary when considering from the cited article.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Nov 2019 02:57:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486970#M193765</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-11-24T02:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to Detect Pass the Hash</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486971#M193766</link>
      <description>&lt;P&gt;Hello! Is this syntax something I need to add to my inputs.conf or what? I am not 100% clear where to implement this... thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2019 17:50:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486971#M193766</guid>
      <dc:creator>johann2017</dc:creator>
      <dc:date>2019-11-25T17:50:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to Detect Pass the Hash</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486972#M193767</link>
      <description>&lt;P&gt;This is an XPATH query written on HP.&lt;BR /&gt;
Therefore, it cannot be used as it is.&lt;BR /&gt;
If you have the sourcetype &lt;STRONG&gt;XmlWinEventLog: Microsoft-Windows-Sysmon / Operational&lt;/STRONG&gt; ,&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.eideon.com/2017-09-09-THL01-Mimikatz/#hunting-with-sysmon-and-windows-events-1"&gt;check this&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2019 18:17:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486972#M193767</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-11-25T18:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to Detect Pass the Hash</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486973#M193768</link>
      <description>&lt;P&gt;working on the same thing, just want to share some ideas.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;index=wineventlog EventCode=4624 Logon_Type=9 Authentication_Package=Negotiate Logon_Process=seclogo&lt;BR /&gt;
index=wineventlog Logon_Process=Seclogo Logon_Type!=2&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;I recommend you read this first:&lt;BR /&gt;
&lt;A href="https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/" target="_blank"&gt;https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;According to this article, you can see the "logon_type=9"and "Logon_Process=seclogo" will show up in the event log of the source host.&lt;BR /&gt;
I did some PTH POC and I agree with this article.&lt;BR /&gt;
Imagine a users laptop was compromised, he is trying PTH everywhere in your network.&lt;BR /&gt;
Usually we don't collect wineventlog on a laptop right? So this rule won't fire in this scenario.&lt;/P&gt;

&lt;P&gt;My observation is, if a PTH is success in your network, you will see 3 winevent log on the target host  at the SAME TIME (eventcode=4672+eventcode=4624+eventcode=5140)&lt;BR /&gt;
Try write a search based on this idea?&lt;BR /&gt;
The defect is, the rule will fire only when the PTH is already success, can't detection PTH attempt.&lt;BR /&gt;
That's all i have man...Please let me know your method if this is been resolved!&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:22:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486973#M193768</guid>
      <dc:creator>jiangzhaohua</dc:creator>
      <dc:date>2020-09-30T04:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to Detect Pass the Hash</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486974#M193769</link>
      <description>&lt;P&gt;for &lt;CODE&gt;(eventcode=4672+eventcode=4624+eventcode=5140) occurs same time&lt;/CODE&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=wineventlog (EventCode=4624 OR EventCode=4624 OR EventCode=5140) Authentication_Package=Negotiate 
| eval time = _time
| bin span=1s time
| stats dc(EventCode) as EventCode_count by host time
| rename time as _time
| where EventCode_count =3
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 28 Feb 2020 18:29:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Detect-Pass-the-Hash/m-p/486974#M193769</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-02-28T18:29:15Z</dc:date>
    </item>
  </channel>
</rss>

