Windows artifacts

Windows artifacts

Event IDs, registry hives, execution artifacts, USB, LNK, and browser paths

4624Successful logon
SecurityAuth

Logon Type field critical: 2=interactive, 3=network, 4=batch, 5=service, 7=unlock, 10=remote interactive, 11=cached

4625Failed logon
SecurityAuth

Check SubStatus: 0xC000006A=wrong password, 0xC0000064=bad username, 0xC000006F=outside hours

4634Logoff
SecurityAuth

Paired with 4624. Type 3 logoffs often immediate — not reliable for session duration

4648Logon with explicit credentials (RunAs)
SecurityAuth

Lateral movement indicator. Subject = source account, Account = target account

4672Special privileges assigned to new logon
SecurityAuth

Indicates admin/privileged account logon. Always follows 4624 for admin accounts

4776NTLM credential validation attempt
SecurityAuth

Generated on DC for domain accounts. Error code 0xC000006A = wrong password

4768Kerberos TGT requested
SecurityAuth

Result code 0x6 = bad username, 0x12 = disabled/expired, 0x17 = expired password

4769Kerberos service ticket requested
SecurityAuth

Kerberoasting generates many 4769s with encryption type 0x17 (RC4)

4720User account created
SecurityAccount Mgmt

Check creator account — lateral movement often creates local accounts

4722User account enabled
SecurityAccount Mgmt

Enabling dormant admin accounts is a persistence technique

4728Member added to security-enabled global group
SecurityAccount Mgmt

Adding to Domain Admins (group 512) is high priority

4732Member added to security-enabled local group
SecurityAccount Mgmt

Adding to Administrators, Remote Desktop Users — lateral movement indicator

4756Member added to universal security group
SecurityAccount Mgmt

Enterprise Admins membership changes

4688New process created
SecurityExecution

Requires audit policy. New Process Name + Creator Process. Enable command-line logging for full visibility

4689Process exited
SecurityExecution

Paired with 4688. Exit code 0=clean, non-zero=error/crash

1Process created (Sysmon)
SysmonExecution

Richer than 4688: includes hash, parent cmdline, current directory. Gold standard

3Network connection (Sysmon)
SysmonExecution

Process-to-IP mapping. Catches C2 beaconing. Pairs with 4688/1

4778RDP session reconnected
SecurityRemote Access

ClientAddress shows source IP. Pairs with 4624 Type 10

4779RDP session disconnected
SecurityRemote Access

Not logoff — session persists in disconnected state

21RDP logon success
TerminalServices-LocalSessionManagerRemote Access

Source IP in event. More reliable than 4624 for RDP tracking

25RDP session reconnect
TerminalServices-LocalSessionManagerRemote Access

User reconnected to existing disconnected session

4663Object access attempt
SecurityObject Access

Requires SACL on object. File/reg read/write/delete. High volume — filter on sensitive paths

4656Handle to object requested
SecurityObject Access

Precedes 4663. Access Mask field: 0x80=read, 0x2=write, 0x10000=delete

7045New service installed
SystemPersistence

Service Name + Image Path. Malware installs services as persistence. Check unusual paths

7036Service started/stopped
SystemPersistence

Operational record of service state changes

4697Service installed (security audit)
SecurityPersistence

Complement to 7045. Requires audit policy. Includes account that installed

4698Scheduled task created
SecurityPersistence

Task name + XML definition. Fileless malware often uses schtasks for persistence

4702Scheduled task updated
SecurityPersistence

Modification of existing task — may indicate tampering

106Task registered
TaskScheduler/OperationalPersistence

More detail than 4698. Includes full task XML

4103PowerShell pipeline execution
PowerShell/OperationalExecution

Module logging. Captures cmdlets and output. Enable via GPO

4104PowerShell script block logged
PowerShell/OperationalExecution

Script block logging — most verbose PS logging. Captures deobfuscated code

400PowerShell engine started
PowerShellExecution

HostApplication field shows invocation method. Downgrade to v2 bypasses 4104

5140Network share accessed
SecurityLateral Movement

Share name + source IP. C$ or ADMIN$ access = lateral movement indicator

5145Network share object access check
SecurityLateral Movement

Detailed file access on shares. High volume

1102Security audit log cleared
SecurityAnti-Forensics

Always investigate. Subject shows who cleared. Timestamp = clearing time not incident time

104System log cleared
SystemAnti-Forensics

Same significance as 1102 for System log

517Audit log cleared (legacy)
SecurityAnti-Forensics

Pre-Vista equivalent of 1102