<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Domain-Controller — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/domain-controller/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/domain-controller/feed.xml" rel="self" type="application/rss+xml"/><item><title>Creation or Modification of Domain Backup DPAPI Private Keys</title><link>https://feed.craftedsignal.io/briefs/2024-01-domain-backup-dpapi/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-domain-backup-dpapi/</guid><description>Detection of creation or modification of Domain Backup private keys, which adversaries may extract from a Domain Controller (DC) to decrypt domain user master key files.</description><content:encoded><![CDATA[<p>This detection identifies the creation or modification of Domain Backup private keys (ntds_capi_<em>.pfx, ntds_capi_</em>.pvk) on Windows systems. Attackers may attempt to extract the Data Protection API (DPAPI) domain backup key from a Domain Controller (DC). Successful extraction of these keys allows the adversary to decrypt any domain user&rsquo;s master key file, granting them unauthorized access to sensitive data and potentially leading to complete domain compromise. This activity is crucial for defenders to detect as it signifies a high-impact credential access attempt. The rule focuses on file creation events associated with specific file names commonly used for DPAPI backup keys.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Domain Controller (DC).</li>
<li>The attacker executes a tool or script designed to extract DPAPI domain backup keys.</li>
<li>The tool retrieves the <code>ntds.dit</code> file, the Active Directory database.</li>
<li>The tool extracts DPAPI domain backup keys, creating files named <code>ntds_capi_*.pfx</code> and <code>ntds_capi_*.pvk</code>.</li>
<li>The attacker stages the extracted key files for exfiltration, potentially copying them to a temporary directory or network share.</li>
<li>The attacker compresses or archives the key files to evade detection.</li>
<li>The attacker exfiltrates the compressed archive to a remote location.</li>
<li>The attacker uses the exfiltrated DPAPI domain backup keys to decrypt domain user master keys offline.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can result in complete domain compromise. By extracting and decrypting DPAPI protected secrets, attackers gain unauthorized access to sensitive information, including user credentials, service accounts, and other critical data. This can lead to lateral movement, data theft, and disruption of services. The impact is considered critical due to the potential for widespread damage and long-term consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon file creation logging to capture the creation of <code>ntds_capi_*.pfx</code> and <code>ntds_capi_*.pvk</code> files.</li>
<li>Deploy the provided Sigma rule to detect the creation or modification of DPAPI backup key files.</li>
<li>Monitor process execution on domain controllers for suspicious command-line activity associated with potential DPAPI extraction tools as described in the overview.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process lineage and destination of the created files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>dpapi</category><category>domain-controller</category></item></channel></rss>