Windows AD Replication Service Traffic

Original Source: [splunk source]
Name:Windows AD Replication Service Traffic
id:c6e24183-a5f4-4b2a-ad01-2eb456d09b67
version:3
date:2024-10-17
author:Steven Dick
status:experimental
type:TTP
Description:The following analytic identifies unexpected Active Directory replication traffic from non-domain controller sources. It leverages data from the Network Traffic datamodel, specifically looking for applications related to AD replication. This activity is significant because AD replication traffic should typically only occur between domain controllers. Detection of such traffic from other sources may indicate malicious activities like DCSync or DCShadow, which are used for credential dumping. If confirmed malicious, this could allow attackers to exfiltrate sensitive credentials, leading to unauthorized access and potential domain-wide compromise.
Data_source:
search:| tstats `security_content_summariesonly` count values(All_Traffic.transport) as transport values(All_Traffic.user) as user values(All_Traffic.src_category) as src_category values(All_Traffic.dest_category) as dest_category min(_time) as firstTime max(_time) as lastTime from datamodel=Network_Traffic where All_Traffic.app IN ("ms-dc-replication","*drsr*","ad drs") by All_Traffic.src All_Traffic.dest All_Traffic.app
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `drop_dm_object_name("All_Traffic")`
| `windows_ad_replication_service_traffic_filter`


how_to_implement:To successfully implement this search, you need to be ingesting application aware firewall or proxy logs into the Network Datamodel. Categorize all known domain controller Assets servers with an appropriate category for filtering.
known_false_positives:New domain controllers or certian scripts run by administrators.
References:
  -https://adsecurity.org/?p=1729
  -https://attack.mitre.org/techniques/T1003/006/
  -https://attack.mitre.org/techniques/T1207/
drilldown_searches:
  :
tags:
  analytic_story:
    - 'Sneaky Active Directory Persistence Tricks'
  asset_type:Endpoint
  confidence:100
  impact:100
  message:Active Directory Replication Traffic from Unknown Source - $src$
  mitre_attack_id:
    - 'T1003'
    - 'T1003.006'
    - 'T1207'
  observable:
    name:'dest'
    type:'IP Address'
    - role:
      - 'Victim'
    name:'src'
    type:'IP Address'
    - role:
      - 'Attacker'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  required_fields:
    - 'All_Traffic.src'
    - 'All_Traffic.dest'
    - 'All_Traffic.app'
  risk_score:100
  security_domain:network

tests:
  :
manual_test:None