← Back to Explore
sigmahighHunting
NetNTLM Downgrade Attack
Detects NetNTLM downgrade attack
Detection Query
selection:
EventID: 4657
ObjectName|contains|all:
- \REGISTRY\MACHINE\SYSTEM
- ControlSet
- \Control\Lsa
ObjectValueName:
- LmCompatibilityLevel
- NtlmMinClientSec
- RestrictSendingNTLMTraffic
condition: selection
Author
Florian Roth (Nextron Systems), wagga
Created
2018-03-20
Data Sources
windowssecurity
Platforms
windows
Tags
attack.persistenceattack.defense-evasionattack.t1562.001attack.t1112
Raw Content
title: NetNTLM Downgrade Attack
id: d3abac66-f11c-4ed0-8acb-50cc29c97eed
related:
- id: d67572a0-e2ec-45d6-b8db-c100d14b8ef2
type: derived
status: test
description: Detects NetNTLM downgrade attack
references:
- https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
author: Florian Roth (Nextron Systems), wagga
date: 2018-03-20
modified: 2022-10-09
tags:
- attack.persistence
- attack.defense-evasion
- attack.t1562.001
- attack.t1112
# Windows Security Eventlog: Process Creation with Full Command Line
logsource:
product: windows
service: security
definition: 'Requirements: Audit Policy : Object Access > Audit Registry (Success)'
detection:
selection:
EventID: 4657
ObjectName|contains|all:
- '\REGISTRY\MACHINE\SYSTEM'
- 'ControlSet'
- '\Control\Lsa'
ObjectValueName:
- 'LmCompatibilityLevel'
- 'NtlmMinClientSec'
- 'RestrictSendingNTLMTraffic'
condition: selection
falsepositives:
- Unknown
level: high