Event ID 4624: Paired Sessions, Integrity Levels, and UAC
The 4624 event in the Security log records successful user logons to Windows systems. This event is critical for monitoring who accessed the system and when. While legitimate logons are common, it can also indicate account compromise, making thorough analysis essential for SOC teams.
Event ID 4624 Details
Field
Description
Sessions (TargetLogonId, TargetLinkedLogonId
)
Session ID created post-logon. Processes inherit this session. Paired Session with Elevated token regisered for accounts with local administrator rights.
Restricted Admin Mode
Indicates whether credentials were cached. Helps trace attacker access after creds dump.
Impersonation Level
Defines how a process acts on behalf of a user.
SID, RID, and Well-Known SIDs
Key Insights
Logon Types Explained
Threat Detection with 4624/4625
Account Compromise:
Successful logons after brute-force (4625) or password spraying.
Critical System Access:
Alert on logons to domain controllers, databases, or unusual times/IPs.
Incident Investigation:
Trace who accessed the system, when, and with what privileges.
Correlated Events
Event 4625 (Failed Logon): Precedes brute-force attacks.
Event 4672 (Special Privileges): Logs privileged account activity.
Mandatory Label
The access token generated during logon includes an Integrity Level (e.g., High, Medium) that governs process/object permissions. In Event 4624, this is reflected in Impersonation Level
.
System
OS-critical processes.
High
Admin privileges.
Medium
Standard user.
Low
Restricted (e.g., browsers).
User Account Control (UAC)
When a user with administrative privileges logs in, User Account Control (UAC) creates two access tokens:
Standard Token (Medium Integrity):
Used for most processes.
Logged as the first session in Event 4624.
Impersonation Level:
%%1843
(Non-elevated).
Elevated Token (High Integrity):
Used for tasks requiring admin rights.
Logged as the second session in Event 4624.
Impersonation Level:
%%1842
(Elevated).
These sessions are linked via the TargetLinkedLogonId field.
How UAC Works:
Default Behavior: Even admin accounts run with Medium Integrity until elevation is requested.
Elevation Prompt: When a process requires admin rights, UAC prompts the user for consent.
AutoElevate: Some trusted processes (e.g.,
fodhelper.exe
,mmc.exe
) can auto-elevate without a prompt if their manifest includesautoElevate="true"
.
UAC Bypass
Attackers exploit trusted processes (e.g., fodhelper.exe
, mmc.exe
) with autoElevate=true
in their manifests to execute code as admin.
Detection Tips:
Compare parent/child process Integrity Levels.
Auto-elevated processes shouldn’t spawn child processes.
Last updated
Was this helpful?