Skip to content

Latest commit

 

History

History
35 lines (28 loc) · 1.33 KB

MATCH-S00268.md

File metadata and controls

35 lines (28 loc) · 1.33 KB

Rules: Windows - Possible Impersonation Token Creation Using Runas

Description

Detects the use of the runas command. Runas can be used to create impersonation tokens in an attempt to elevate privileges.

Additional Details

Detail Value
Type Templated Match
Category Privilege Escalation
Apply Risk to Entities device_hostname, device_ip, user_username
Signal Name Windows - Possible Impersonation Token Creation Using Runas
Summary Expression Detected potential impersonation token creation on host: {{device_hostname}}
Score/Severity Static: 1
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0004, _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1134, _mitreAttackTechnique:T1134.001, _mitreAttackTechnique:T1134.002, _mitreAttackTechnique:T1134.003

Vendors and Products

Fields Used

Origin Field
Normalized Schema baseImage
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema user_username