Forum Discussion
ReccoB
Aug 25, 2020Copper Contributor
Successful login from anonymous account
I have a small honeypot environment and been working on making new queries for threat hunting. During this process I came across a login successful for the anonymous account. What has baffled me a bit is that it came from a remote address, but wasn't an elevated entry.
Does anyone have some tips and tricks to deep dive into this a little better or is this something you would typically ignore?
| TimeGenerated [UTC] | 2020-08-24T05:22:23.433Z |
| SourceSystem | OpsManager |
| Account | NT AUTHORITY\ANONYMOUS LOGON |
| AccountType | User |
| Computer | Server |
| EventSourceName | Microsoft-Windows-Security-Auditing |
| Channel | Security |
| Task | 12544 |
| Level | 8 |
| EventID | 4624 |
| Activity | 4624 - An account was successfully logged on. |
| AuthenticationPackageName | NTLM |
| ElevatedToken | %%1843 |
| ImpersonationLevel | %%1833 |
| IpAddress | 223.31.97.130 |
| IpPort | 43515 |
| KeyLength | 0 |
| LmPackageName | NTLM V1 |
| LogonGuid | 00000000-0000-0000-0000-000000000000 |
| LogonProcessName | NtLmSsp |
| LogonType | 3 |
| LogonTypeName | 3 - Network |
| Process | - |
| ProcessId | 0x0 |
| ProcessName | - |
| RestrictedAdminMode | - |
| SubjectAccount | -\- |
| SubjectDomainName | - |
| SubjectLogonId | 0x0 |
| SubjectUserName | - |
| SubjectUserSid | S-1-0-0 |
| TargetAccount | NT AUTHORITY\ANONYMOUS LOGON |
| TargetDomainName | NT AUTHORITY |
| TargetLinkedLogonId | 0x0 |
| TargetLogonId | 0x1130dcf |
| TargetOutboundDomainName | - |
| TargetOutboundUserName | - |
| TargetUserName | ANONYMOUS LOGON |
No RepliesBe the first to reply