EXPLORE
← Back to Explore
sigmahighHunting

NetNTLM Downgrade Attack

Detects NetNTLM downgrade attack

MITRE ATT&CK

persistencedefense-evasion

Detection Query

selection:
  EventID: 4657
  ObjectName|contains|all:
    - \REGISTRY\MACHINE\SYSTEM
    - ControlSet
    - \Control\Lsa
  ObjectValueName:
    - LmCompatibilityLevel
    - NtlmMinClientSec
    - RestrictSendingNTLMTraffic
condition: selection

Author

Florian Roth (Nextron Systems), wagga

Created

2018-03-20

Data Sources

windowssecurity

Platforms

windows

Tags

attack.persistenceattack.defense-evasionattack.t1562.001attack.t1112
Raw Content
title: NetNTLM Downgrade Attack
id: d3abac66-f11c-4ed0-8acb-50cc29c97eed
related:
    - id: d67572a0-e2ec-45d6-b8db-c100d14b8ef2
      type: derived
status: test
description: Detects NetNTLM downgrade attack
references:
    - https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
author: Florian Roth (Nextron Systems), wagga
date: 2018-03-20
modified: 2022-10-09
tags:
    - attack.persistence
    - attack.defense-evasion
    - attack.t1562.001
    - attack.t1112
# Windows Security Eventlog: Process Creation with Full Command Line
logsource:
    product: windows
    service: security
    definition: 'Requirements: Audit Policy : Object Access > Audit Registry (Success)'
detection:
    selection:
        EventID: 4657
        ObjectName|contains|all:
            - '\REGISTRY\MACHINE\SYSTEM'
            - 'ControlSet'
            - '\Control\Lsa'
        ObjectValueName:
            - 'LmCompatibilityLevel'
            - 'NtlmMinClientSec'
            - 'RestrictSendingNTLMTraffic'
    condition: selection
falsepositives:
    - Unknown
level: high