Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Authentication Data Transaction

Account Logon Flow v0.1


Local User Account
Security System Extention Loaded

A security package has been loaded by the Local Security


Authority.

C:\Windows\system32\lsasrv.dll : Negotiate

C:\Windows\system32\negoexts.DLL : NegoExtender

C:\Windows\system32\kerberos.DLL : Kerberos

C:\Windows\system32\msv1_0.DLL : NTLM Local User Scenario

C:\Windows\system32\tspkg.DLL : TSSSP
LSASS Initialization Send Credentials from Winlogon to LSASS If the account is a local user account, the user’s
C:\Windows\system32\pku2u.DLL : pku2u credentials are passed to the Negotiate Security
Authentication Data Gathering Support Provider (SSP), which then passes them to the
Local System Account Logon
In the second part of Step 1, the C:\Windows\system32\cloudAP.DLL : CloudAP After a credential provider gets authentication data from MSV1_0 security support provider/authentication
Local Security Authority LogonUI’s purpose is to collect user credentials and the user, Winlogon invokes the LsaLogonUser function package (SSP/AP). Negotiate SSP selects between
Subsystem Service (LSASS) Even though the Local System C:\Windows\system32\wdigest.DLL : WDigest pass them to LSASS for validation. LogonUI is invoked to pass authentication data to LSASS. The Kerberos SSP/AP and MSV1_0 SSP/AP. For local
process is initialized. The LSASS account is a built-in special LsaLogonUser function uses LsaAuthenticationPort, Local User Logon: MSV1_0 Answer Special privileges assigned to new logon.
by Winlogon each time authenticated data needs to be account interactive logons, MSV1_0 SSP/AP is An account was successfully logged on localy
component is a process that account which represents the C:\Windows\system32\schannel.DLL : Schannel collected/gathered from a user. After LogonUI gets a LSASS’s ALPC port for communications. selected. You will find multiple 4622 events that inform Explorer.exe

4688 contains components of the


Windows security subsystem. 4608 machine itself, it also performs its
logon to the system. 4627 C:\Windows\system32\schannel.DLL : Microsoft Unified
Security Protocol Provider
4610 user’s credentials and passes them to LSASS, it
terminates. 4648 Desktop Windows Manager (DWM) Logon 4627 4611 you that lsass.exe loaded a specific security package
(SSP/AP). The Security Package Name has the
following format: Package DLL Location : Package
4610 After MSV1_0 gets a user’s account hash from the
SAM manager, it compares it with a hash generated
from the user’s supplied credentials.
4648 Some information in this event is the same as in the
4648 event.
4627 If a user’s elevated token has one of the special
privileges, a 4672 event is generated containing all
detected special privileges.
4688 Userinit.exe creates explorer.exe
N

A logon was attempted using explicit A logon was attempted using explicit Group membership information Userinit.exe
Winlogon Process initialization

Winlogon is initialized. Winlogon is a


4688 Successful System Startup

This event is logged when


4624 Group membership information
4622 Security System Extention Used

An authentication package has been loaded by the


4688 credentials.
4624 Group membership information
4673 A trusted logon process has been registered
4622 Security System Extention Used

An authentication package has been loaded by the


4676 credentials

The event shows the logon initiation attempt for a


4624 After every 4624 successful logon event, the 4627
event is invoked. It contains SIDs for all groups of which
4672 At the end of the local interactive logon authentication
process, Winlogon sends information to the userinit.exe
4688
As a result of a successful LsaRegisterLogonProcess()
system component (it’s a process) that LSASS.EXE starts and the Local Security Authority. This authentication package Local Security Authority. This authentication package normal interactive logon. It is initiated by the local the user is a member. process, which loads the user’s profile. After the user’s
function call explain in this event. This logon process is
acts as a proxy component between auditing subsystem is initialized. will be used to authenticate logon attempts. will be used to authenticate logon attempts. SYSTEM account. profile is loaded, userinit.exe creates a local shell,
now trusted to submit logon requests. This event
the user and Windows authentication invoking the explorer.exe process. You should see two
contains the name of a logon process (Logon Process
subsystem internals. It is also 4688 events: one for userinit.exe and another one for
Name) that was successfully registered using
responsible for switching Windows explorer.exe. Winlogon.exe creates userinit.exe and
LsaRegisterLogonProcess().
desktops and handling the Secure then userinit.exe creates explorer.exe.
Attention Sequence (SAS)

Security Package Post-Initialization


Loading

Domain User Scenario

SYSTEM Account Logon


Negotiate SSP selects an appropriate authentication
package to handle the authentication request. It will
Credentials Validation on the Domain Controller
always try Kerberos AP first. If Kerberos AP is able to
proceed with the request, the data is sent to the domain

Get Authentication Data and Create DWM Session


controller for validation. If the Kerberos or MSV1_0 packages were able to
4648 reach the domain controller, then the domain controller
validates the credentials.

Initialization A logon was attempted using explicit


credentials.

The event shows the logon initiation attempt for a


normal interactive logon. It is initiated by the local
SYSTEM account.

4624
An Domain account was successfully logged on localy

An account was successfully logged on

Domain User Acсount

4624
RemoteInteractive Logon (10)

RemoteInteractive Logon Cached Credentials (12)

Interactive Logon With Cached Credentials (11)

Network Logon (3)

NetworkCleartext Logon (8)


Logon Types
Unlock Logon (7)

https://twitter.com/rimpq
Special thanks to Andrei Miroshnikov for awesome book
"Windows Security Monitoring: Scenarios and Patterns" https://www.amazon.com/gp/product/B07BGHYF61

You might also like