Skip to content

Latest commit

 

History

History
36 lines (29 loc) · 1.76 KB

NewAuthenticationAppDetected.md

File metadata and controls

36 lines (29 loc) · 1.76 KB

New Authentication App Detected

Query Information

MITRE ATT&CK Technique(s)

Technique ID Title Link
T1078.004 Valid Accounts: Cloud Accounts https://attack.mitre.org/techniques/T1078/004

Description

Detect a new app that is used to send authentication request to your tenant. The authentication requests do not have to be succesful. The app can eighter be an internal app, then the AppID is filled, if that is not the case then it is a external app. A false positive is a new app that is used within your organization.

Risk

A malicious actor installs a malicious app in your environment. This app can then be used for malicious purposes, depending on the priviliges that the app has. Such as AD Recon, collecting tokens or internal spearphishing.

References

Sentinel

let KnownApps = SigninLogs
// Adjust the timerange depending on the retention period
| where TimeGenerated between (ago(90d) .. ago(2d))
| distinct AppDisplayName;
SigninLogs
| where TimeGenerated > ago(2d)
| where not(AppDisplayName in~ (KnownApps))
// If the AppID is empty then it is a third party App.
| extend IsExternalApp = iff(isempty(AppId), "True", "False")
| project-reorder IsExternalApp, AppDisplayName, Identity, IPAddress, ClientAppUsed
// For ResultType Reference see: https://learn.microsoft.com/en-us/azure/active-directory/develop/reference-aadsts-error-codes