Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Information to Insights: Intrusion Analysis Methodology
Published:
July 30, 2025

Information to Insights: Intrusion Analysis Methodology

By:
Anton Ovrutsky
Share icon
Glitch effectGlitch effectGlitch effect

When you’re performing intrusion analysis, it’s easy to get disoriented. 

There are usually hundreds of Windows event IDs to sort through, generated by potentially thousands of endpoints. Indeed, this Gordian knot is not easily untangled.

How does one find the needle in this proverbial haystack? 

Most write-ups will focus on particular Windows event IDs: look at event ID 4625 to find brute force attacks. 

Armed with this information, an instance of Windows Event Viewer is opened and filtered for 4625 events, which show thousands of results with different usernames and timestamps, some events going back months. 

Has this organization been breached for months? Are all these user accounts compromised?

This is the difference between information and analysis.

A 4625 event is just a piece of information. To provide value and insights, it needs to be turned into an analysis and contextualized. 

This blog outlines some of the techniques and methodologies used by the Huntress Tactical Response team to suss out intrusions and turn information into actionable insights for our partners.


Authentication events

Let’s begin by looking at authentication events. We’ll focus on successful 4624 and failed 4625 logins here, as these events are enabled by default and present on hosts in most cases.

It’s very easy to gloss over the nuances that exist within authentication failure events, so let’s look at some examples.

Here we have two 4625 Windows events side by side: 

Two 4625 Windows security events
Figure 1: Image showing two 4625 Windows security events


Event 1 illustrates a failed login for the username “Tom,” while Event 2 shows a failed login for the username “Administrator.” 

We have the “information” here: failed logins for the "Tom" and "Administrator" accounts. We also have the source IP address and workstation name. This is fantastic information indeed, as we have a few more pivot points now. However, we need to peel back the layers here to extract analysis from these two events. 

If you look carefully, you’ll notice that the SubStatus field for these two events is different. 

Event 1 has a SubStatus of 0xC0000064, whereas Event 2 has a SubStatus of 0xC000006A. If we look at documentation for event ID 4625 via Ultimate Windows Security, we see a handy table translating these values for us:

Windows security event ID 4625 error code translation table
Figure 2: Windows security event ID 4625 error code translation table


Now we can turn the information from the 4625 events into some insights!

In the context of intrusion analysis, a failed login event that contains a username that doesn’t exist in the environment is extremely suspicious. Of course, scanners and misconfigured applications cause this dynamic. However, if the activity isn’t historically observed, it should be treated as a priority thread to pull on. 

This kind of analysis will also help you weed out suspicious/malicious failed logins from those occurring normally due to expired passwords, users entering their passwords incorrectly, etc. 

If we look at Event 1 again, we now have the following points to work from:

  • A failed login occurred from an unknown workstation (WORKSTATION)
  • This failed login attempted to authenticate with a username that doesn’t exist in the environment
  • The login occurred from an IP address that isn’t found in any organizational inventory tooling 

In this case, we took a piece of information (a singular 4625) event, and turned it into an actionable insight by simply looking closely at the various status and sub-status codes contained within it. 

Let’s take a look at another example, this time using 4624 (successful login) events. 

Again, we have two similar-looking 4624 events side by side.


Windows security 4624 event IDs side-by-side
Figure 3: Two Windows security 4624 event IDs side-by-side


Both these events show a successful login for the Administrator account, so how do we spot the suspicious one? 

A key field here is the AuthenticationPackageName field—Event 1 has an “NTLM” for this value, and Event 2 has “Kerberos”. 

Tooling that performs brute force attacks often has options to configure whether NTLM or Kerberos is used. The scanner/smb/smb_login module from Metasploit can configure this setting, for example:


Authentication methods within Metasploit’s smb_login module
Figure 4: Illustration of configurable authentication methods within Metasploit’s smb_login module


Although this option can be changed, why not take advantage of a threat actor’s laziness for our gain?

In this case, we have two similar-looking 4624 events, but through analysis and methodology, we can differentiate Event 1 as more suspicious than Event 2, given the following factors:

  • Observed NTLM authentication 
    • This point carries much more weight if you look at historical patterns of authentication and identify that this is the first time a particular account uses NTLM for authentication, rather than Kerberos 
  • A suspicious workstation name of WORKSTATION

The first and second examples outlined are not to be viewed in isolation. Often—and as experienced by our team in real-world intrusions—these two dynamics play out in tandem. That is, a threat actor will land in the environment and perform some kind of brute force or password-spray attack before finding success with an account in the environment. 

By looking closely at just two Windows event IDs, we can potentially gather information about the source of the brute force, what accounts were compromised, from where they were compromised, and whether this activity is malicious or legitimate.

So far, we’ve been looking at one event at a time. However, if we think about what a successful brute force looks like, we can assume that successful login events will be generated on multiple workstations within our domain. 

In addition, these events will likely share the same suspicious characteristics outlined so far regarding authentication protocols and workstation names. 

Let’s take a look at what this looks like in practice. 

In this scenario, a threat actor has landed in an environment and successfully brute forced three different hosts on the network: 


Successful brute force via Metasploit
Figure 5: Image showing successful brute force via Metasploit 


Rather than looking at an event individually, let’s look at all three authentication events generated by the above brute force. 

Windows security 4624 events of successful brute force
Figure 6: Three distinct Windows security 4624 events showing a successful brute force
 


We can see three distinct 4624 events with successful logins and events generated on the host to which the authentication was successful. What can we glean from these events? Quite a bit!

We see:

  • A single account (Administrator) authenticating to three distinct systems: win11v, win11a, DC
  • All three authentications occurred at the same time
  • All three authentications came from the same IP address and workstation combination 
  • All three events used the NTLM authentication protocol, not Kerberos 

Once again, we can turn information from a singular event into insights by just a little bit of aggregation. 

Typically, some kind of logging platform or SIEM would be used to analyze this data, but these kinds of systems aren't available to everyone. And even if they are available, writing effective queries is often difficult and comes with a steep learning curve that isn’t feasible for some organizations. Sometimes we’re left with bare bones tooling like Windows Event Viewer or PowerShell, and we need to make the most of it! 

Just two different Windows event IDs, when properly analyzed, can give us a ton of insight and bubble up additional threads to pull on during investigations. Below is a mind map of some considerations and analysis techniques for these two events.


Mind map of 4624/4625 event ID analysis
Figure 7: Mind map of 4624/4625 event ID analysis


Let’s switch gears slightly and look at some credential access avenues, particularly registry credential dumping. 


Credential access

One of the most popular types of credential access attempts that we see on the Tactical Response team is registry credential dumping. This technique can be executed remotely from the threat actor's machine, and gives them various credential material in the form of hashes that can then be passed or cracked. 

This technique does not require the threat actor to upload anything to the victim’s machine and does not require interaction with the LSASS process, making it a popular technique for threat actors trying to avoid endpoint detection.

The threat actor's view of registry credential dumping looks something like the following.  


Registry credential dumping via Impacket secretsdump
Figure 8: Image of successful registry credential dumping via Impacket secretsdump


If we then look at the event logs generated from this activity, we can see our old friend 4624 again. 

We can see again that the authentication protocol for this event is NTLM, and the source network address belongs to the same IP address that we observed brute forcing our environment.


4624 event resulting from registry credential dumping
Figure 9: Image showing a 4624 event resulting from registry credential dumping


This event contains an extremely useful field called the logon ID, which we haven’t covered yet, so let’s look at it. 

Think of this field as the “glue” between disparate Windows events. It’s a way to track what a particular login session did on a host through a common field. You’ll often hear security professionals on the defensive side of the infosec spectrum talk about “pivoting” off certain values. Indeed, a logon ID is a prime candidate for pivoting.

Ideally, you’d use a SIEM to craft a query showing the various activities undertaken by a certain logon ID, but a SIEM isn’t always available. A handy trick is to simply put a suspicious logon ID into a search text bot within the event viewer, and click on “find next” to see the events that come up. 

An example of this low-tech technique is below. 


Animation of technique for pivoting off a Login ID
Figure 10: Animation showing a simple technique for pivoting off a Login ID 


We can see within 5145 event IDs the various suspicious tmp values written to administrative file shares on the host that was the target for the credential dumping. 

We can also see relative target names like winreg, samr, svcctl. If we combine the suspicious elements observed in these events alongside the initial suspicious login, we now have a good idea of what technique was performed, where it was performed from, and what host was targeted for registry credential dumping.

Once again, we take various pieces of information, like 4624 and 5145 events, and analyze them to turn this information into actionable insights. This is a prime example of how important methodology is to intrusion investigations. 

Fancy tooling is definitely fun to use, but if you don’t have a solid process and methodology behind your analysis, tooling will only serve as a distraction. Often, tooling will also abstract analysis from you. For example, you may only work with tooling that labels activity as “Registry Credential Dumping” and presents the information it has to you, but does not expose the raw telemetry it used to make this determination. The closer you position your analysis techniques to the raw telemetry, the more refined your methodology becomes. 


Lateral movement

One of the more popular methods for lateral movement that we come across is the Remote Desktop Protocol (RDP). Threat actors like targeting RDP because it provides a graphical interface and is usually enabled in networks.

As you begin searching Google for information related to RDP authentication events, you’ll likely find guidance telling you to look at security event ID 4624 with a logon type of 10. An example of this event can be found below. 


Windows event ID 4624 showing a successful RDP login
Figure 11: Windows event ID 4624 showing a successful RDP login


This is indeed a fantastic indicator of RDP activity. This event clearly shows where the login came from, as well as the username used for the RDP connection. 

During an intrusion, if you suspect RDP lateral movement activity is going on, you usually rush to open up Event Viewer, browse to the security log, and get greeted with the following: 


Event ID 1102 - Security log cleared
Figure 12: Image showing event ID 1102 - Security log cleared


Indicator removal, particularly the cleaning of the Windows event log—specifically the security log channel—is a technique that we unfortunately encounter a lot. 

If you’re fortunate enough to have a SIEM in place, this technique is likely less worrisome, as the telemetry has already been shipped off the system on which the logs were cleared. 

But, what happens if you don’t have a SIEM in place and want to investigate this RDP lateral movement? The following log channels can swoop in and save the day:

Microsoft-Windows-TerminalServices-LocalSessionManager/Operational 

and 

Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational 

Specifically, we can use event ID 25 and event ID 1149 to find the source of RDP lateral movement, should the security log be cleared.


Windows events triggered by RDP authentication
Figure 13: Image showing two Windows events triggered by successful RDP authentication 


These events are extremely valuable and important, even if the security event log has not been cleared, since a type-10 4624 event isn’t always generated on every RDP-related login. In this case, the IP addresses are internal. However, if your RDP server is internet-exposed, you may find external IP addresses in this telemetry. From here, you can use IP enrichment, particularly ASN information, to determine whether the event is malicious or benign.

Check out our blog on how to use this ASN information for hunting and response! 

This dynamic again illustrates the difference between looking for information in standalone events and applying a sound methodology to extract insight from this information. It’s very easy to overlook certain nooks and crannies within event logs. If you don’t see 4624 type-10 events, it doesn’t necessarily mean no RDP lateral movement took place. 


Conclusion

Today, information is plentiful. There are thousands of write-ups, videos, blogs, tutorials, courses, et cetera, on virtually any offensive security or DFIR-related topic. This is not to mention the capabilities that LLMs provide. However, insights are missing from this abundance of information. 

We often get so wrapped up in presenting as much information as possible to various stakeholders that we forget that information needs to be processed and analyzed through a repeatable process, underpinned by solid and proven methodology. 

This blog has presented various scenarios in which information is turned into insights through the methodology used by the Tactical Response team here at Huntress.





Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • I Wish I Was a Little Bit Taller: Dealing with Imperfection in Intrusions

    See how the Huntress Tactical Response team tackles security telemetry gaps. We share real-world techniques for working with missing logs, degraded telemetry, and cloud logging challenges to uncover critical insights and improve investigations.
  • Untold Tales from Huntress Tactical Response

    Explore the inner workings of real-world cyberattacks and gain insight into the challenges faced by Huntress threat analysts. Discover the critical role of investigative techniques and their importance in uncovering and addressing these threats.
  • Analyzing Initial Access Across Today's Business Environment

    Learn more about the initial access techniques observed by the Huntress SOC and Tactical Response teams! Gain valuable insights to help you protect your environment.
  • Know Thy Enemy: A Novel November Case on Persistent Remote Access

    In this blog, Huntress SOC investigators unravel the lateral movement and persistence of an interesting threat actor and their novel infrastructure
  • Boring Isn’t Harmless: The Risks Behind Common Cyberattack Tradecraft

    Don’t underestimate basic attacker tradecraft tactics. Learn how common cybersecurity tradecraft succeeds and get practical tips from the Huntress SOC to shut it down.
  • PerfMon! What Is It Good For?

    Explore how Performance Monitor (PerfMon) counters can be used as alternative methods for detecting Kerberos roasting attacks, moving beyond the traditional reliance on Windows Events 4768/4769.
  • Managed SIEM and the Art of Perfecting Cyber Defense

    How Huntress Managed SIEM turns signal recognition into defensive mastery.
  • Cyber Hygiene Fails That Invite Hackers—and How to Shut Them Down

    Poor credential hygiene and misconfigurations give hackers an easy way in. See real-world cyber hygiene failures, how attackers exploit them, and how Managed EDR stops them cold.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy