Windows Large Number of Computer Service Tickets Requested

Original Source: [splunk source]
Name:Windows Large Number of Computer Service Tickets Requested
id:386ad394-c9a7-4b4f-b66f-586252de20f0
version:4
date:2024-09-30
author:Mauricio Velazco, Splunk
status:production
type:Anomaly
Description:The following analytic detects a high volume of Kerberos service ticket requests, specifically more than 30, from a single source within a 5-minute window. It leverages Event ID 4769, which logs when a Kerberos service ticket is requested, focusing on requests with computer names as the Service Name. This behavior is significant as it may indicate malicious activities such as lateral movement, malware staging, or reconnaissance. If confirmed malicious, an attacker could gain unauthorized access to multiple endpoints, potentially compromising the entire network.
Data_source:
  • -Windows Event Log Security 4769
search:`wineventlog_security` EventCode=4769 ServiceName="*$" TargetUserName!="*$"
| bucket span=5m _time
| stats dc(ServiceName) AS unique_targets values(ServiceName) as host_targets by _time, IpAddress, TargetUserName
| where unique_targets > 30
| `windows_large_number_of_computer_service_tickets_requested_filter`


how_to_implement:To successfully implement this search, you need to be ingesting Domain Controller and Kerberos events. The Advanced Security Audit policy setting `Audit Kerberos Authentication Service` within `Account Logon` needs to be enabled.
known_false_positives:An single endpoint requesting a large number of kerberos service tickets is not common behavior. Possible false positive scenarios include but are not limited to vulnerability scanners, administration systems and missconfigured systems.
References:
  -https://thedfirreport.com/2023/01/23/sharefinder-how-threat-actors-discover-file-shares/
  -https://attack.mitre.org/techniques/T1135/
  -https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4769
drilldown_searches:
name:'View the detection results for - "$IpAddress$"'
search:'%original_detection_search% | search IpAddress = "$IpAddress$"'
earliest_offset:'$info_min_time$'
latest_offset:'$info_max_time$'
name:'View risk events for the last 7 days for - "$IpAddress$"'
search:'| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$IpAddress$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
earliest_offset:'$info_min_time$'
latest_offset:'$info_max_time$'
tags:
  analytic_story:
    - 'Active Directory Privilege Escalation'
    - 'Active Directory Lateral Movement'
  asset_type:Endpoint
  confidence:50
  impact:60
  message:A large number of kerberos computer service tickets were requested by $IpAddress$ within 5 minutes.
  mitre_attack_id:
    - 'T1135'
    - 'T1078'
  observable:
    name:'IpAddress'
    type:'Endpoint'
    - role:
      - 'Victim'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  required_fields:
    - '_time'
    - 'EventCode'
    - 'ServiceName'
    - 'TargetUserName'
    - 'IpAddress'
  risk_score:30
  security_domain:endpoint

tests:
name:'True Positive Test'
 attack_data:
  data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1135/large_number_computer_service_tickets/windows-security.log
  source: XmlWinEventLog:Security
  sourcetype: XmlWinEventLog
manual_test:None