Rules: Windows - Possible Impersonation Token Creation Using Runas
Detects the use of the runas command. Runas can be used to create impersonation tokens in an attempt to elevate privileges.
Detail | Value |
---|---|
Type | Templated Match |
Category | Privilege Escalation |
Apply Risk to Entities | device_hostname, device_ip, user_username |
Signal Name | Windows - Possible Impersonation Token Creation Using Runas |
Summary Expression | Detected potential impersonation token creation on host: {{device_hostname}} |
Score/Severity | Static: 1 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0004, _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1134, _mitreAttackTechnique:T1134.001, _mitreAttackTechnique:T1134.002, _mitreAttackTechnique:T1134.003 |
Origin | Field |
---|---|
Normalized Schema | baseImage |
Normalized Schema | commandLine |
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | user_username |