AZT601.1 - Steal Managed Identity JsonWebToken: Virtual Machine IMDS Request#
By utilizing access to IMDS, an attacker can request a JWT for a Managed Identity on an Azure VM if they have access to execute commands on the system.
Resource
Virtual Machine
Actions
- Microsoft.Compute/virtualMachines/write
- Microsoft.Compute/virtualMachines/extensions/*
Detections
The detection will be based off of the Command Execution technique chosen. If using RDP, then no logs will be generated in Azure. Since the command to retrieve the JWT requires local PowerShell execution, script block logging will reveal the request used to gather the token.
Queries#
Platform | Query |
---|---|
Log Analytics | union Event, Syslog | where EventID == 4104 and RenderedDescription has 'http://169.254.169.254/metadata/identity/oauth2/token' or SyslogMessage has 'http://169.254.169.254/metadata' |