Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
Identity Analytics |
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
Attackers may leverage the domain replication process to extract sensitive information (DCSync).
Attacker's Goals
An attacker is trying to retrieve Active Directory data, including password hashes.
Investigative actions
- Check the role of the account, and see if it should initiate a DC synchronization.
- Check if the account performing the DCSync is related to a new DC.
- Find the source host of the DCSync (correlate between event 4662 and 4624 based on the field 'Logon ID').
- Check if the account was recently added to an administrative groups/had new sensitive privileges assigned to it.
- Monitor suspicious traffic to/from the host to identify lateral movement or access to sensitive resources.