Skip to content

Latest commit

 

History

History
55 lines (44 loc) · 2.09 KB

evtx-4625-failed-logon.md

File metadata and controls

55 lines (44 loc) · 2.09 KB

Security/4625: An account failed to log on

This logon event indicates an account has failed to authenticate to the endpoint. It is logged on the destination endpoint. It closely mirrors the information logged for the event 4624: An account was successfully logged on.

Note

This event is a Logon Event, meaning it is logged on the system that is being authenticated to.

Behavioral Indications

  • Behavioral - Lateral Movement (TA0008)

Analysis Value

  • Account - Login History
  • Account - Security Identifier (SID)
  • Network Activity - Source Identification

Operating System Availability

  • Windows 11
  • Windows 10
  • Windows 8
  • Windows 7
  • Windows Vista
  • Windows XP

Artifact Location(s)

  • %SystemRoot%\System32\Winevt\Logs\Security.evtx

Artifact Interpretation

The following fields may be interpreted from this artifact:

Field Name Interpretation
Logon Type Logon type. See Logon Types
Account For Which Logon Failed / Security ID SID of account that authenticated
Account For Which Logon Failed / Account Name Name of account that authenticated
Network Information / Source Network Address IP address of source endpoint

Note

The SID may be translated by event viewer. To view the raw SID, look at the event's XML data, which has the following fields available:

XML Field Name Interpretation
EventData/LogonType Logon type. See Logon Types
EventData/TargetUserSid SID of account that authenticated
EventData/TargetUserName Name of account that authenticated
EventData/IpAddress IP address of source endpoint

Logon Types

The following logon types are commonly seen:

Logon Type Description
2 Interactive (user loggong on through screen or virtual console)
3 Network (RDP with NLA enabled)
7 Unlock (RDP reconnects or interactive unlocking)
9 Explicit credentials (runas)
10 Remote Interactive (RDP with NLA diasbled)