Lateral movement
Windows DFIR notes are no longer maintained on InfoSec-Notes. Updated versions can be found on: artefacts.help.
The artefacts generated independently of the lateral movement technics used are introduced in the [DFIR] Windows - Account Usage
note. The artefacts presented below are associated with a given lateral movement technique.
Remote Desktop artefacts
Destination machine
EVTX
Security.evtx
Default configuration.
Event 4624: An account was successfully logged on
.
LogonType
field:
LogonType 10
for standard RemoteInteractive
authentication.
Replaced by LogonType 7
(This workstation was unlocked
) for existing session unlocking.
Replaced by LogonType 3
for RDP
RestrictedAdmin
mode.
Eventual prior event 4624
LogonType 3
for NLA
authentication.
Source user domain and username. Source machine hostname / IP.
EVTX
Security.evtx
Requires Audit Other Logon/Logoff Events
.
Event 4778: A session was reconnected to a Window Station
.
Event 4779: A session was disconnected from a Window Station
.
Source user domain and username. Source machine hostname / IP.
EVTX
Microsoft-Windows-TerminalServices-RemoteConnectionManager%4Operational.evtx
Default configuration.
Event 1149: Remote Desktop Services: User authentication succeeded
Does not indicate a successful session opening but an access to the Windows login screen. This event is however only generated upon successful authentication if Network Level Authentication (NLA)
is required.
Source user domain and username.
Source machine IP.
This event followed by unusual / suspicious activity of NT AUTHORITY\SYSTEM
may indicate the use of a Sticky Keys
or Utilman
backdoor.
EVTX
Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational
Default configuration.
Event 21: Remote Desktop Services: Session logon succeeded
.
Event 22: Remote Desktop Services: Shell start notification received
.
Event 23: Remote Desktop Services: Session logoff succeeded
.
Event 25: Remote Desktop Services: Session reconnection succeeded
.
With Source Network Address
!= LOCAL
.
Source user domain and username. Source machine IP.
EVTX
Microsoft-WindowsRemoteDesktopServicesRdpCoreTS%4Operational.evtx
Default configuration.
Introduced in >= Windows Server 2012
.
Event 131: The server accepted a new TCP connection from client <IP>
.
Does not indicate a successful session opening but a network access to the RDS service.
Source machine IP.
Prefetch
C:\Windows\Prefetch\
Only generated on Windows desktop OS by default.
Prefetch files related to RDP
activity:
TSTHEME.EXE-<RANDOM>.pf
RDPCLIP.EXE-<RANDOM>.pf
Timestamp of last runs and overall number of executions.
Filesystem MFT UsnJrnl
C:\Windows\Prefetch\
$MFT
\$Extend\$UsnJrnl
Only generated on Windows desktop OS by default.
Entries for Prefetch files related to RDP
activity:
TSTHEME.EXE-<RANDOM>.pf
RDPCLIP.EXE-<RANDOM>.pf
The most recent Prefetch file LastModified
timestamp correspond to the last RDP
activity.
The MFT
and UsnJrnl
may yield information about RDP
historic activity.
Shimcache Amcache
HKLM\SYSTEM
registry hive
Amcache.hve
Unreliably generated.
Entries for rdpclip.exe
and / or tstheme.exe
.
Source machine
EVTX
Security.evtx
Default configuration.
Only logged if NLA
is enabled on the destination AND alternate credentials are used.
Event 4648: A logon was attempted using explicit credentials
.
Legacy:
Events 552: Logon attempt using explicit credentials
.
Current logged-on user's domain and username.
Alternate user's domain and username.
Destination machine's hostname. The Network Information
section only yields information about the client.
EVTX
Microsoft-WindowsTerminalServicesRDPClient%4Operational.evtx
Default configuration.
Current logged-on user's domain and username.
Event 1024
: destination machine's hostname.
Event 1102
: destination machine's IP.
Registry
C:\Users\<USERNAME>\NTUSER.DAT
NTUSER\Software\Microsoft\Terminal Server Client\Servers
Default configuration.
EVTX
Security.evtx
Requires Audit process tracking
to be enabled.
For the process arguments to be logged, Include command line in process creation events
must be enabled as well.
Event 4688: A new process has been created
.
New Process Name
: C:\Windows\System32\mstsc.exe
.
Current logged-on user's domain, username and LogonID
.
Parent process.
If the destination machine is specified in the command line, and the command line logged, yields the destination machine's hostname / IP.
(SourceName = 'Microsoft-Windows-TerminalServices-LocalSessionManager' AND (EventID = 21 or EventID = 22 or EventID = 23 or EventID = 24 or EventID = 25 or EventID = 39 or EventID = 40)) (SourceName = 'Microsoft-Windows-TerminalServices-RemoteConnectionManager' AND EventID = 1149)"
PsExec artefacts
Remote Scheduled Tasks artefacts
Remote job schedule registration, execution and deletion
Location : Victim Microsoft-Windows-TaskScheduler%4Operational.evtx
hive.
Artifact : Task Scheduler Event Log(since win7)
Registering Job schedule ID : 106
Account Name used to registration
Job Name : Usually “At#” form
Starting Job schedule ID : 200
The path of file executed for job
Deleting Job schedule ID : 141
Account Name used for the deletion
The creation, execution and deletion of a scheduled task will notably, in addition to
Security
EID 4624
andEID 4672
events, generate the following Windows events:Microsoft-Windows-TaskScheduler/Operational
hive,EID 106: User "<DOMAIN | HOSTNAME>\<USERNAME> | <SID>" registered Task Scheduler task "\<TASK_NAME>"
.Microsoft-Windows-TaskScheduler/Operational
hive,EID 140: User "<DOMAIN | HOSTNAME>\<USERNAME> | <SID>" updated Task Scheduler task "\<TASK_NAME>"
.Microsoft-Windows-TaskScheduler/Operational
hive,EID 141: User "<DOMAIN | HOSTNAME>\<USERNAME> | <SID>" deleted Task Scheduler task "\<TASK_NAME>"
.Microsoft-Windows-TaskScheduler/Operational
hive,EID 129: Task Scheduler launch task "\<TASK_NAME>", instance "<INSTANCE>" with process ID <PID>
.Microsoft-Windows-TaskScheduler/Operational
hive,EID 100: Task Scheduler started "<INSTANCE>" instance of the "\<TASK_NAME>" task for user "NT AUTHORITY\SYSTEM | <DOMAIN | HOSTNAME>\<USERNAME> | <SID>"
.Microsoft-Windows-TaskScheduler/Operational
hive,EID 140: User "<DOMAIN | HOSTNAME>\<USERNAME> | <SID>" updated Task Scheduler task "\<TASK_NAME>"
.Security
, ifAudit object access
is enabled forSuccess
andFailure
,EID 4698: A scheduled task was created
. Includes the scheduled task detailed configuration (author, triggers, executing user, command and eventual command argument, etc.) and can be correlated to a logon session using the eventLogon ID
.Security
, ifAudit object access
is enabled forSuccess
andFailure
,EID 4702: A scheduled task was updated
. Specifies the user at the origin of the modification, the task name of the updated scheduled task and can be correlated to a logon session using the eventLogon ID
.Security
, ifAudit object access
is enabled forSuccess
andFailure
,EID 4699: A scheduled task was deleted
. Specifies the user at the origin of the modification, the task name of the updated scheduled task and can be correlated to a logon session using the eventLogon ID
.
Remote Windows Services artefacts
WMI artefacts
WinRM artefacts
| Microsoft-Windows-WinRM/Operational | 6 | X | Creating WSMan Session
.
Logged on the client host. The event connection string field include the remote host address. | | Microsoft-Windows-WinRM/Operational | 91 | X | Session creation
. | | Microsoft-Windows-WinRM/Operational | 161 | X | The client cannot connect to the destination specified in the request.
Error event, logged on the remote system.
The User
and Computer
event fields provide information on the client. | | Microsoft-Windows-WinRM/Operational | 168 | X | Session creation
. |
WinRM Operational event log entries indicating authentication prior to PowerShell remoting on an accessed system • Event ID 169: “User [DOMAIN\Account] authenticated successfully using [authentication_protocol]”
System event log entries indicating a configuration change to the Windows Remote Management service: ○ Event ID 7040 “The start type of the Windows Remote Management (WS-Management) service was changed from [disabled / demand start] to auto start.” – recorded when PowerShell remoting is enabled. ○ Event ID 10148 (“The WinRM service is listening for WS-Management requests”) – recorded upon reboot on systems where remoting has been enabled.
WinRM Operational event log entries indicating authentication prior to PowerShell remoting on an accessed system: ○ Event ID 169 (“User [DOMAIN\Account] authenticated successfully using [authentication_protocol]”)
DCOM artefacts
References
https://dfironthemountain.wordpress.com/2019/02/15/rdp-event-log-dfir/
https://digital-forensics.sans.org/media/SANS_Poster_2018_Hunt_Evil_FINAL.pdf
https://jpcertcc.github.io/ToolAnalysisResultSheet/details/mstsc.htm
https://nullsec.us/windows-rdp-related-event-logs-the-client-side-of-the-story/
https://ponderthebits.com/2018/02/windows-rdp-related-event-logs-identification-tracking-and-investigation/
https://purerds.org/remote-desktop-security/auditing-remote-desktop-services-logon-failures-1/
https://repo.zenk-security.com/Forensic/A-forensic-analysis-of-apt-lateral-movement-in-windows-environment.pdf
https://salt4n6.com/2019/09/22/event-id-1024/
https://www.13cubed.com/downloads/rdp_flowchart.pdf
https://www.andreafortuna.org/2020/06/04/windows-forensic-analysis-some-thoughts-on-rdp-related-event-ids/
https://www.manageengine.com/products/active-directory-audit/kb/windows-security-log-event-id-X.html
https://www.youtube.com/watch?v=qxPoKNmnuIQ
Last updated