Windows DiagTrackEoP default login username

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects exploitation of the DiagTrack privilege escalation vulnerability using the default username indicator.

Strategy

This rule monitors Windows Security Audit events, where @evt.id is 4624 for NewCredentials logon type 9 when @Event.EventData.Data.TargetOutboundUserName is set to “thisisnotvaliduser”. This specific username is a hardcoded indicator used by proof-of-concept exploits targeting the DiagTrack service privilege escalation vulnerability (CVE-2021-31958). The vulnerability allows local attackers to escalate privileges from low-privileged users to SYSTEM through manipulation of the Connected User Experiences and Telemetry service.

Triage and response

  • Examine the source process and user context that triggered the NewCredentials logon with the default exploit username on {{host}}.
  • Check for signs of successful privilege escalation by reviewing subsequent high-privilege process execution or system-level activities.
  • Analyze the system for presence of known DiagTrack exploit tools or suspicious PowerShell activity that may have triggered the vulnerability.
  • Review system patching status to determine if the CVE-2021-31958 vulnerability has been properly remediated.
  • Investigate the initial access vector that allowed the attacker to execute the privilege escalation exploit on the system.