VMware ESXi - Shared or stolen root account
| Id | 9c496d6c-42a3-4896-9b6c-00254386928f |
| Rulename | VMware ESXi - Shared or stolen root account |
| Description | Detects when shared or stolen root account. |
| Severity | High |
| Tactics | InitialAccess PrivilegeEscalation |
| Techniques | T1078 |
| Required data connectors | SyslogAma |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1h |
| Trigger threshold | 1 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiSharedOrStolenRootAccount.yaml |
| Version | 1.0.3 |
| Arm template | 9c496d6c-42a3-4896-9b6c-00254386928f.json |
VMwareESXi
| where SyslogMessage has_all ('UserLoginSessionEvent', 'root', 'logged in')
| extend SrcIpAddr = extract(@'root@(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})', 1, SyslogMessage)
| summarize count() by SrcIpAddr, bin(TimeGenerated, 15m)
| where count_ > 1
| extend IPCustomEntity = SrcIpAddr
queryFrequency: 1h
tactics:
- InitialAccess
- PrivilegeEscalation
name: VMware ESXi - Shared or stolen root account
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMWareESXi/Analytic Rules/ESXiSharedOrStolenRootAccount.yaml
triggerThreshold: 1
description: |
'Detects when shared or stolen root account.'
status: Available
kind: Scheduled
entityMappings:
- entityType: IP
fieldMappings:
- identifier: Address
columnName: IPCustomEntity
id: 9c496d6c-42a3-4896-9b6c-00254386928f
queryPeriod: 1h
version: 1.0.3
severity: High
relevantTechniques:
- T1078
requiredDataConnectors:
- connectorId: SyslogAma
datatypes:
- Syslog
triggerOperator: gt
query: |
VMwareESXi
| where SyslogMessage has_all ('UserLoginSessionEvent', 'root', 'logged in')
| extend SrcIpAddr = extract(@'root@(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})', 1, SyslogMessage)
| summarize count() by SrcIpAddr, bin(TimeGenerated, 15m)
| where count_ > 1
| extend IPCustomEntity = SrcIpAddr