Gain Code Execution on ADFS Server via Remote WMI Execution

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


'This query detects instances where an attacker has gained the ability to execute code on an ADFS Server through remote WMI Execution. In order to use this query you need to be collecting Sysmon EventIDs 19, 20, and 21. If you do not have Sysmon data in your workspace this query will raise an error stating: Failed to resolve scalar expression named "[@Name]" For more on how WMI was used in Solorigate see https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second

Attribute Value
Type Analytic Rule
Solution Standalone Content
ID 0bd65651-1404-438b-8f63-eecddcec87b4
Severity Medium
Kind Scheduled
Tactics LateralMovement
Techniques T1210
Required Connectors SecurityEvents, WindowsSecurityEvents, WindowsForwardedEvents
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
Event Source == "Microsoft-Windows-Sysmon" ?
SecurityEvent ?
WindowsEvent EventID in "1,19,20,21,4624,4688" ?

Associated Connectors

The following connectors provide data for this content item:

Connector Solution
ESI-Opt34DomainControllersSecurityEventLogs Microsoft Exchange Security - Exchange On-Premises
SecurityEvents Windows Security Events
WindowsForwardedEvents Windows Forwarded Events
WindowsSecurityEvents Windows Security Events

Solutions: Microsoft Exchange Security - Exchange On-Premises, Windows Forwarded Events, Windows Security Events


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules