Windows Event Investigation - Big
Windows Event Investigation - Big
Investigation
By Ibrahim Saleh
Windows Event
1
4. Login ID: unique number for every logon session, used to trace user
when he logon until logoff.
5. User: the user context that the source was running as when it logged
the event. Note that this field often indicates “System” or a user that is
not the cause of the event being recorded.
6. Logged: local timestamp.
7. Task category: assign by the source that generate the event.
8. Description: A text block where additional information specific to the
event being logged is recorded.
2
Account management and login
3
Security Windows Events Types:
1) Logon Success:
a) Event ID: 4624
b) Subject: Details of the account that requested the logon, not the user
who logged on, For Event ID 4624, the values of the Subject section are
usually empty and not useful.
c) Logon Type: describe the way used to logon, logon type(2) for
interactive logon (using keyboard), logon type(3) for remote logon,
logon type (9) for RDP logon
d) New Logon: User who logged in the system
e) Process Information: This section includes information about the
Windows process that initiated the logon activity.
f) Network Information: Details for Who Connect to this machine
Remote if user login in this PC Local This field empty, Useful for LTM.
4
3) Logon Failed:
a) Event ID: 4625
b) Contains two important fields:
Status: indicates the overall result of the logon attempt, you can take this
hex value and search to know what is mean.
Sub-Status: provides more detailed information about the reason for the
logon failure. It gives additional context to the "Status" field.
When you see a lot of login failure, keep your mind this is brute
force attack or password spraying, you can specify which one by
look in status and sub-status.
4) Tracking Session: using login ID we can trace all user activity and to
determine the length of a session.
6
Network Shared Object
7
Windows Process and Related Events
8
o Username: SYSTEM, LOCAL SERVICE, or NETWORK
SERVICE
o Parent Process: services.exe
There are a lot of process you can read more in this article
1) Event ID (4688):
o Records every process creation activity and Attributes, contains very
useful information about the username, process name, process path, and
parent process.
o Creator Subject filed: Information about the user and login session
that initiated the newly created process, Creator Subject as well as the
owner of the parent process that created the new process.
o Target Subject field: This section provides information about the user
who owns the newly created process and whose context the process runs
under, as well as the login session associated with the process.
o Process Information field: Contain new process ID, new process name,
token Elevation type, mandatory Labe, creator process ID, creator process
name, and process command line.
Note: Token Elevation Type indicates the type of token that was assigned to
the new process in accordance with User Account Control policy.
Type 1 is a full token with no privileges removed or groups disabled. A full
token is only used if User Account Control is disabled or if the user is the built-
in Administrator account or a service account.
Type 2 is an elevated token with no privileges removed or groups disabled. An
elevated token is used when User Account Control is enabled and the user
chooses to start the program using Run as administrator. An elevated token is
also used when an application is configured to always require administrative
privilege or to always require maximum privilege, and the user is a member of
the Administrators group.
Type 3 is a limited token with administrative privileges removed and
administrative groups disabled. The limited token is used when User Account
Control is enabled, the application does not require administrative privilege,
and the user does not choose to start the program using Run as administrator.
9
2) Event ID (4689):
o Records every process exit activity Attributes
o Contain Subject, and Process information
o We can link 4688 and 4689 to make full view about process
10
PowerShell Events
PowerShell Attacks:
o Fileless PowerShell Malware: is a type of malicious
software that leverages PowerShell to carry out malicious
activities without writing traditional malware files to the
system's disk. Instead of relying on executable files that are
stored on disk, fileless malware operates in memory, making it
more challenging to detect by traditional antivirus solutions.
You can detect this by reviewing Event ID 4104
o Suspicious PowerShell Command: DownloadFile, -
ExecutionPolicy OR -ep, -EncodedCommand, OR -e OR -enc,
Invoke-Command, Enter-PSSession, Invoke-webRequest
12