Account Usage Investigation Workflow & Cheatsheet
Windows Enterprise DFIR - SOC Analyst Reference
๐ฏ Investigation Objectives
When investigating account usage, determine:
WHO: Which accounts were used (local vs domain)
WHEN: Timeline of authentication events
WHERE: Source and destination systems
HOW: Authentication method and logon type
WHAT: Actions performed and resources accessed
WHY: Legitimate business need or suspicious activity
๐ Quick Reference: Critical Event IDs
Authentication Events (Security.evtx)
4624
Successful Logon
Both
๐ด Critical
4625
Failed Logon
Both
๐ด Critical
4776
Credential Validation
NTLM
๐ High
4768
TGT Granted
Kerberos
๐ High
4769
Service Ticket Requested
Kerberos
๐ก Medium
4771
Pre-auth Failed
Kerberos
๐ด Critical
4634/4647
Logoff
Both
๐ข Low
4648
Explicit Credentials (runas)
Both
๐ด Critical
4672
Admin Rights Logon
Both
๐ด Critical
4778
RDP Session Reconnect
N/A
๐ High
4779
RDP Session Disconnect
N/A
๐ก Medium
4720
Account Created
N/A
๐ด Critical
4697
Service Installed
N/A
๐ด Critical
Service Events (System.evtx)
7045
Service Installed
๐ด Critical
7034
Service Crashed
๐ High
7036
Service Start/Stop
๐ก Medium
7040
Service Startup Changed
๐ High
๐ Investigation Workflow
Phase 1: Initial Triage (First 15 Minutes)
Step 1.1: Identify the Scope
Step 1.2: Quick Account Profiling
Document:
Account type (Local/Domain/Cloud)
Account status (Active/Disabled/Locked)
Group memberships
Account age and last password change
Phase 2: Authentication Analysis (30 Minutes)
Step 2.1: Collect Authentication Events
On Workstation (Local Auth):
On Domain Controller (Domain Auth):
Step 2.2: Analyse Logon Types
Logon Type Decision Tree:
Red Flags:
Type 8 (cleartext credentials)
Type 10 from unusual IPs/countries
Type 3 during off-hours to sensitive servers
Multiple Type 4625 (failed logons) followed by Type 4624 (brute force)
Type 9 with service accounts
Phase 3: Timeline Construction (45 Minutes)
Step 3.1: Build Authentication Timeline
PowerShell Timeline Script:
Step 3.2: Correlate with Other Activity
Check for:
Phase 4: Deep Dive Analysis (1-2 Hours)
Step 4.1: RDP Investigation
If Type 10 logons detected:
Artifact Collection:
Step 4.2: Registry Analysis
SAM Hive Analysis:
Look for:
Last login timestamps
Password last set dates
Login counts (high counts = automation/service account)
Failed login attempts
Cloud account indicators (InternetUserName value)
Unusual RIDs or account creation times
NTUSER.DAT Analysis:
Check for:
Recent documents accessed
Typed URLs (web activity)
UserAssist (program execution)
Run/RunOnce keys (persistence)
MRU lists (recently used files)
WordWheelQuery (search terms)
Step 4.3: Service Analysis
Query Service Events:
Red Flags:
Services installed during suspicious logon timeframe
Service names with random characters
Services running from temp directories
Services with unusual account contexts
Services that crash immediately after suspicious activity
Step 4.4: User Access Logging (Server Only)
For Windows Server 2012+:
Extract:
Source IP addresses
Accessed services
Access timestamps
Total access counts
Authentication types
User accounts used
Phase 5: Pattern Analysis (30 Minutes)
Step 5.1: Identify Anomalies
Statistical Analysis:
Step 5.2: Check for Attack Indicators
Common Attack Patterns:
Password Spray
Multiple accounts, few failed attempts each, Type 3
Brute Force
Single account, many 4625 events, then 4624
Pass-the-Hash
Type 3 logons, NTLM auth, no Type 2 on source
Pass-the-Ticket
Kerberos auth without initial 4768, unusual SPNs
Golden Ticket
Long ticket lifetimes, unusual encryption types
Lateral Movement
Type 3 chain across multiple systems
Privilege Escalation
4672 events, Type 9 logons, new admin access
Persistence
Service installs (7045), scheduled tasks, Run keys
RDP Hijacking
4778 without preceding 4624, session transfers
Phase 6: Lateral Movement Tracking (1 Hour)
Step 6.1: Map Authentication Chain
Build Network Map:
PowerShell Lateral Movement Detector:
Step 6.2: Correlate with Process Execution
Check what was executed after authentication:
Red Flags:
PowerShell execution immediately after Type 3 logon
cmd.exe with suspicious command lines
psexec, wmic, mmc, sc.exe usage
Mimikatz or other credential dumping tools
Remote management tools (TeamViewer, AnyDesk)
๐ ๏ธ Tool Quick Reference
Built-in Windows Tools
Registry Analysis Tools
RDP Artifact Analysis
UAL Analysis (Server)
SAM Analysis
๐ Investigation Checklist
Initial Assessment
[ ] Identify affected account(s)
[ ] Determine account type (Local/Domain/Cloud)
[ ] Verify current account status
[ ] Establish investigation timeframe
[ ] Identify affected systems
Data Collection
[ ] Security.evtx from affected workstation
[ ] Security.evtx from Domain Controller
[ ] System.evtx from affected systems
[ ] Terminal Services logs (if RDP used)
[ ] SAM registry hive
[ ] NTUSER.DAT from user profile
[ ] RDP Bitmap Cache (if applicable)
[ ] UAL databases (if server)
[ ] Network traffic logs
[ ] EDR/AV logs
Authentication Analysis
[ ] Timeline of 4624/4625 events
[ ] Analyse logon types distribution
[ ] Identify source IPs/hostnames
[ ] Check for failed logon patterns
[ ] Verify authentication protocols used
[ ] Review explicit credential usage (4648)
[ ] Check for privilege escalation (4672)
Artifact Analysis
[ ] RDP session artifacts reviewed
[ ] Registry analysis completed
[ ] Service events examined
[ ] Process execution correlated
[ ] File access patterns checked
[ ] Network connections mapped
Lateral Movement
[ ] Authentication chain mapped
[ ] Pivot points identified
[ ] Affected systems documented
[ ] Attack timeline constructed
Pattern Analysis
[ ] Baseline behaviour established
[ ] Anomalies identified
[ ] Attack patterns matched
[ ] IOCs extracted
[ ] Risk assessment completed
Documentation
[ ] Timeline created
[ ] Evidence preserved
[ ] Screenshots captured
[ ] IOCs documented
[ ] Report prepared
๐จ Quick Win: High-Value Queries
Detect Potential Compromise
1. Find after-hours admin logons:
2. Detect password spray attempts:
3. Find Type 10 (RDP) logons from external IPs:
4. Identify explicit credential usage (runas):
5. Find service installations during suspicious timeframe:
๐ Pro Tips
Efficiency Tips
Use FilterHashtable instead of Where-Object for faster queries
Narrow timeframes - don't query entire logs if you know the window
Query remote systems in parallel using PowerShell jobs
Export to CSV for analysis in Excel/Timeline Explorer
Use date math:
(Get-Date).AddDays(-7)for relative dates
Analysis Tips
Start broad, then narrow - overview first, deep dive on anomalies
Follow the data - let artifacts guide your investigation
Trust but verify - logs can be cleared/modified
Look for absence - missing logs are suspicious
Context matters - one odd event might be normal, patterns aren't
Documentation Tips
Screenshot everything - you may need it for reports
Note your commands - reproducibility is critical
Preserve original evidence - work on copies
Chain of custody - document who, what, when, where
Timeline format - use ISO 8601 (YYYY-MM-DD HH:MM:SS)
Common Pitfalls
โ Only checking Security log (also check System, Application, specialised logs)
โ Ignoring logon type (Type 3 vs Type 10 context is critical)
โ Not checking Domain Controller (domain auth happens there)
โ Forgetting about log rotation (events may be archived)
โ Tunnel vision on one indicator (look for corroborating evidence)
๐ Escalation Criteria
Escalate Immediately If:
โ Admin account compromise confirmed
โ Domain Controller authentication anomalies
โ Evidence of credential dumping tools
โ Lateral movement to multiple critical systems
โ After-hours access to sensitive data repositories
โ Service account used interactively
โ Cloud admin account suspicious activity
โ Evidence of golden ticket or similar advanced attack
โ Data exfiltration indicators
โ Ransomware/malware execution correlated with logon
๐ Additional Resources
Microsoft Documentation
Windows Security Log Encyclopedia
Advanced Security Audit Policies
Account Logon Events Reference
Tools
Eric Zimmerman Tools Suite (KAPE, RECmd, Timeline Explorer)
Volatility Framework (memory analysis)
Chainsaw (Sigma rule detection for Windows Event Logs)
DeepBlueCLI (PowerShell threat hunting)
Training
SANS FOR500 (Windows Forensics)
SANS FOR508 (Advanced Incident Response)
MITRE ATT&CK Framework (Credential Access, Lateral Movement tactics)
๐ Report Template Structure
Remember: The best investigation is methodical, documented, and reproducible. Take your time, be thorough, and let the evidence tell the story.
Last updated