Possible DCSync from a non domain controller

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

Impacket Analytics

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

Attackers may pose a compromised host as a DC to replicate data to it (DCSync).

Attacker's Goals

An attacker is trying to retrieve Active Directory data, including password hashes.

Investigative actions

Check whether one of the machines is a new domain controller.

Variations

DCSync from a non domain controller from a non-standard process

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

High

Description

Attackers may pose a compromised host as a DC to replicate data to it (DCSync).

Attacker's Goals

An attacker is trying to retrieve Active Directory data, including password hashes.

Investigative actions

Check whether one of the machines is a new domain controller.


Large DCSync from a non domain controller by AppID

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

Attackers may pose a compromised host as a DC to replicate data to it (DCSync).

Attacker's Goals

An attacker is trying to retrieve Active Directory data, including password hashes.

Investigative actions

Check whether one of the machines is a new domain controller.


Large DCSync from a non domain controller

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

Attackers may pose a compromised host as a DC to replicate data to it (DCSync).

Attacker's Goals

An attacker is trying to retrieve Active Directory data, including password hashes.

Investigative actions

Check whether one of the machines is a new domain controller.


Possible DCSync from an internet-facing server

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

Attackers may pose a compromised host as a DC to replicate data to it (DCSync).

Attacker's Goals

An attacker is trying to retrieve Active Directory data, including password hashes.

Investigative actions

Check whether one of the machines is a new domain controller.


DCSync from a non domain controller

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

Attackers may pose a compromised host as a DC to replicate data to it (DCSync).

Attacker's Goals

An attacker is trying to retrieve Active Directory data, including password hashes.

Investigative actions

Check whether one of the machines is a new domain controller.