Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
|
Detector Tags |
Impacket Analytics |
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Low |
Description
Attackers may pose a compromised host as a DC to replicate data to it (DCSync).
Attacker's Goals
An attacker is trying to retrieve Active Directory data, including password hashes.
Investigative actions
Check whether one of the machines is a new domain controller.
Variations
DCSync from a non domain controller from a non-standard process
Synopsis
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
High |
Description
Attackers may pose a compromised host as a DC to replicate data to it (DCSync).
Attacker's Goals
An attacker is trying to retrieve Active Directory data, including password hashes.
Investigative actions
Check whether one of the machines is a new domain controller.
Large DCSync from a non domain controller by AppID
Synopsis
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Medium |
Description
Attackers may pose a compromised host as a DC to replicate data to it (DCSync).
Attacker's Goals
An attacker is trying to retrieve Active Directory data, including password hashes.
Investigative actions
Check whether one of the machines is a new domain controller.
Large DCSync from a non domain controller
Synopsis
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Medium |
Description
Attackers may pose a compromised host as a DC to replicate data to it (DCSync).
Attacker's Goals
An attacker is trying to retrieve Active Directory data, including password hashes.
Investigative actions
Check whether one of the machines is a new domain controller.
Possible DCSync from an internet-facing server
Synopsis
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Medium |
Description
Attackers may pose a compromised host as a DC to replicate data to it (DCSync).
Attacker's Goals
An attacker is trying to retrieve Active Directory data, including password hashes.
Investigative actions
Check whether one of the machines is a new domain controller.
DCSync from a non domain controller
Synopsis
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Low |
Description
Attackers may pose a compromised host as a DC to replicate data to it (DCSync).
Attacker's Goals
An attacker is trying to retrieve Active Directory data, including password hashes.
Investigative actions
Check whether one of the machines is a new domain controller.