I hope you're doing well.
I'm currently experiencing a log detection problem related to a Kerberoasting attack on my Wazuh server. Here's the background:
Events with ID 4769 do go up in Wazuh (as confirmed by the log files), but they are not correctly decoded, which prevents me from triggering an alert to detect this type of attack.
I'd also like to point out that I don't see these los in the Wazuh Dashboard when applying filters with attaues IOCs.
2024 Dec 12 14:12:11 (APOLLON-DC02-150) any->EventChannel {"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","eventID":"4769","version":"0","level":"0","task":"14337","opcode":"0","keywords":"0x8020000000000000","systemTime":"2024-12-12T13:11:00.878063400Z","eventRecordID":"3189432","processID":"588","threadID":"3672","channel":"Security","computer":"apollon.thunder.olympus.local","severityValue":"AUDIT_SUCCESS","message":"\"A Kerberos service ticket was requested.\r\n\r\nAccount Information:\r\n\tAccount Name:\t\telectra....@THUNDER.OLYMPUS.LOCAL\r\n\tAccount Domain:\t\tTHUNDER.OLYMPUS.LOCAL\r\n\tLogon GUID:\t\t{4bec7cf5-2b71-2aed-f0f3-133fa284e1e0}\r\n\r\nService Information:\r\n\tService Name:\t\tclio.alcyone\r\n\tService ID:\t\tS-1-5-21-2514850342-1308460479-2044018965-1119\r\n\r\nNetwork Information:\r\n\tClient Address:\t\t::ffff:192.168.10.154\r\n\tClient Port:\t\t48296\r\n\r\nAdditional Information:\r\n\tTicket Options:\t\t0x40810010\r\n\tTicket Encryption Type:\t0x17\r\n\tFailure Code:\t\t0x0\r\n\tTransited Services:\t-\r\n\r\nThis event is generated every time access is requested to a resource such as a computer or a Windows service. The service name indicates the resource to which access was requested.\r\n\r\nThis event can be correlated with Windows logon events by comparing the Logon GUID fields in each event. The logon event occurs on the machine that was accessed, which is often a different machine than the domain controller which issued the service ticket.\r\n\r\nTicket options, encryption types, and failure codes are defined in RFC 4120.\""},"eventdata":{"targetUserName":"electra....@THUNDER.OLYMPUS.LOCAL","targetDomainName":"THUNDER.OLYMPUS.LOCAL","serviceName":"clio.alcyone","serviceSid":"S-1-5-21-2514850342-1308460479-2044018965-1119","ticketOptions":"0x40810010","ticketEncryptionType":"0x17","ipAddress":"::ffff:192.168.10.154","ipPort":"48296","status":"0x0","logonGuid":"{4bec7cf5-2b71-2aed-f0f3-133fa284e1e0}"}}}
2024 Dec 12 14:17:06 (APOLLON-DC02-150) any->EventChannel {"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","eventID":"4769","version":"0","level":"0","task":"14337","opcode":"0","keywords":"0x8020000000000000","systemTime":"2024-12-12T13:15:55.889248000Z","eventRecordID":"3189562","processID":"588","threadID":"3672","channel":"Security","computer":"apollon.thunder.olympus.local","severityValue":"AUDIT_SUCCESS","message":"\"A Kerberos service ticket was requested.\r\n\r\nAccount Information:\r\n\tAccount Name:\t\tvag...@THUNDER.OLYMPUS.LOCAL\r\n\tAccount Domain:\t\tTHUNDER.OLYMPUS.LOCAL\r\n\tLogon GUID:\t\t{2190600e-9945-78a5-b225-c4cf5301f56e}\r\n\r\nService Information:\r\n\tService Name:\t\tclio.alcyone\r\n\tService ID:\t\tS-1-5-21-2514850342-1308460479-2044018965-1119\r\n\r\nNetwork Information:\r\n\tClient Address:\t\t::ffff:192.168.10.154\r\n\tClient Port:\t\t48694\r\n\r\nAdditional Information:\r\n\tTicket Options:\t\t0x40810010\r\n\tTicket Encryption Type:\t0x17\r\n\tFailure Code:\t\t0x0\r\n\tTransited Services:\t-\r\n\r\nThis event is generated every time access is requested to a resource such as a computer or a Windows service. The service name indicates the resource to which access was requested.\r\n\r\nThis event can be correlated with Windows logon events by comparing the Logon GUID fields in each event. The logon event occurs on the machine that was accessed, which is often a different machine than the domain controller which issued the service ticket.\r\n\r\nTicket options, encryption types, and failure codes are defined in RFC 4120.\""},"eventdata":{"targetUserName":"vag...@THUNDER.OLYMPUS.LOCAL","targetDomainName":"THUNDER.OLYMPUS.LOCAL","serviceName":"clio.alcyone","serviceSid":"S-1-5-21-2514850342-1308460479-2044018965-1119","ticketOptions":"0x40810010","ticketEncryptionType":"0x17","ipAddress":"::ffff:192.168.10.154","ipPort":"48694","status":"0x0","logonGuid":"{2190600e-9945-78a5-b225-c4cf5301f56e}"}}}
My aim is to decode this log correctly so as to be able to detect Kerberoasting attacks, with the IOC :
- EventID : 4769
- Account name that is NOT a service or machine account (ending with $), so any normal domain user account
- Service Names that do NOT end with $
- Ticket encryption type will be 0x17 which is RC4 encryption
Could you help me create a suitable decoder and also a rule, or direct me to resources/documentation specific to this problem? Any help would be greatly appreciated.
Thank you in advance for your support.
Sincerely
Loic Ngounou