Investigating a Suspected AD FS Distributed Key Management (DKM) Attack
Investigating a suspected AD FS Distributed Key Management (DKM) attack on an endpoint using KQL (Kusto Query Language) and Microsoft Defender.
Step 1: Understand the Attack Context
Step 2: Queries for Microsoft Defender Using KQL
DeviceFileEvents
| where FolderPath contains "ADFS_DATA" and FileName endswith ".pfx"
| where ActionType in ("FileAccessed", "FileModified")
| project Timestamp, DeviceName, FolderPath, FileName, ActionType, InitiatingProcessFileName, InitiatingProcessCommandLine, InitiatingProcessAccountName
| order by Timestamp desc
//Expanded Query
DeviceFileEvents
| where FolderPath contains "ADFS_DATA" and FileName endswith ".pfx"
| where ActionType in ("FileAccessed", "FileModified")
| project Timestamp, DeviceName, FolderPath, FileName, ActionType, InitiatingProcessFileName, InitiatingProcessCommandLine
| join kind=leftouter (DeviceProcessEvents
| project DeviceName, InitiatingProcessFileName, InitiatingProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessAccountDomain
) on $left.DeviceName == $right.DeviceName and $left.InitiatingProcessFileName == $right.InitiatingProcessFileName
| project Timestamp, DeviceName, FolderPath, FileName, ActionType, InitiatingProcessFileName, InitiatingProcessCommandLine, InitiatingProcessAccountName, InitiatingProcessAccountDomain
| order by Timestamp desc2. Process Interacting with DKM-Related Files
Step 3: Investigation in Microsoft Defender
Step 4: Mitigation Steps
Step 5: Post-Incident Actions
PreviousDomain Dominance Attacks - Detection & AnalysisNextAuthentication From Suspicious DeviceName
Last updated