Splunk Search

Pass the hash query review

kamil
Engager

Hello everyone

I'm trying to build search for Pass the Hash.
I've seen below article:
https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/

However in my environment there is no sysmon so i made this:

index=windows
signature_id=4624
Logon_Type=9
Logon_Process=seclogo
|transaction host endswith="EventCode=4672" maxevents=10

I'm not sure if I used transaction query in proper way. 

Thanks for suggestions!

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Your transaction command is grammatically correct, but still may not work.  It depends on if the raw event contains the literal string "EventCode=4672" or not.  Check the data.

That said, a query that expects sysmon data may not work without sysmon as those events often contain information not found elsewhere.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Splunk Search APIを使えば調査過程が残せます

   このゲストブログは、JCOM株式会社の情報セキュリティ本部・専任部長である渡辺慎太郎氏によって執筆されました。 Note: This article is published in both Japanese ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...