Name:Unusual Number of Computer Service Tickets Requested id:ac3b81c0-52f4-11ec-ac44-acde48001122 version:4 date:2024-10-17 author:Mauricio Velazco, Splunk status:experimental type:Hunting Description:The following analytic identifies an unusual number of computer service ticket requests from a single source, leveraging Event ID 4769, "A Kerberos service ticket was requested." It uses statistical analysis, including standard deviation and the 3-sigma rule, to detect anomalies in service ticket requests. This activity is significant as it may indicate malicious behavior such as lateral movement, malware staging, or reconnaissance. If confirmed malicious, an attacker could gain unauthorized access to multiple endpoints, facilitating further compromise and potential data exfiltration. Data_source:
-Windows Event Log Security 4769
search:`wineventlog_security` EventCode=4769 Service_Name="*$" Account_Name!="*$*" | bucket span=2m _time | stats dc(Service_Name) AS unique_targets values(Service_Name) as host_targets by _time, Client_Address, Account_Name | eventstats avg(unique_targets) as comp_avg , stdev(unique_targets) as comp_std by Client_Address, Account_Name | eval upperBound=(comp_avg+comp_std*3) | eval isOutlier=if(unique_targets >10 and unique_targets >= upperBound, 1, 0) | `unusual_number_of_computer_service_tickets_requested_filter`
how_to_implement:To successfully implement this search, you need to be ingesting Domain Controller and Kerberos events. The Advanced Security Audit policy setting `Audit Kerberos Authentication Service` within `Account Logon` needs to be enabled. known_false_positives:An single endpoint requesting a large number of computer service tickets is not common behavior. Possible false positive scenarios include but are not limited to vulnerability scanners, administration systeams and missconfigured systems. References: -https://attack.mitre.org/techniques/T1078/ drilldown_searches:
: tags: analytic_story: - 'Active Directory Lateral Movement' - 'Active Directory Kerberos Attacks' - 'Active Directory Privilege Escalation' asset_type:Endpoint confidence:60 impact:70 message: mitre_attack_id: - 'T1078' observable: name:'Client_Address' type:'Endpoint' - role: - 'Victim' product: - 'Splunk Enterprise' - 'Splunk Enterprise Security' - 'Splunk Cloud' required_fields: - '_time' - 'EventCode' - 'Ticket_Options' - 'Ticket_Encryption_Type' - 'dest' - 'service' - 'service_id' risk_score:42 security_domain:endpoint