Splunk Search

Pass the hash query review

kamil
Engager

Hello everyone

I'm trying to build search for Pass the Hash.
I've seen below article:
https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/

However in my environment there is no sysmon so i made this:

index=windows
signature_id=4624
Logon_Type=9
Logon_Process=seclogo
|transaction host endswith="EventCode=4672" maxevents=10

I'm not sure if I used transaction query in proper way. 

Thanks for suggestions!

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Your transaction command is grammatically correct, but still may not work.  It depends on if the raw event contains the literal string "EventCode=4672" or not.  Check the data.

That said, a query that expects sysmon data may not work without sysmon as those events often contain information not found elsewhere.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...