Home Windows Security and Relative Identifiers (SIDS and RIDS)
Post
Cancel

Windows Security and Relative Identifiers (SIDS and RIDS)

Overview

During analysis of suspected or known breaches, the use of these identifiers can assist in various ways. One of the most common is looking for processes, including legitimate ones, that originate from incorrect file paths or running under the wrong account. This does delve into knowing common processes and being able to identified expected behaviors from those that may be malicious.

Security and Relative Identifiers (SID/RID) are utilized by Active Directory to identify objects known as Security Principals which include Users, Computers, and Groups. A SID value is constructed in several components with the RID being one of the more important components.

Breaking Down SIDS

SID and RID Example

The above image depicts a the whoami /all command being run via the command prompt on a Windows Server. The top section depicts the current users SID with the bottom half displaying group SIDs. Below we can see the user SID for the domain user ‘malnet\administrator’ with a breakdown of the core components.

Digging further into these components can help with quickly identifying potentially nefarious behaviors. The following provides more context relating to the various SID components:

SID Breakdown

  • Literal Prefix: ‘S’ indicates that the string that follows is a SID object, ‘1’ is a revision marker, indicating that this SID is the first revision.
  • Identifier Authority: The issuing authority identification marker (0 - Null, 1 - World, 2 - Local, 3 - Creator, 5 - Security)
  • Sub Authorities: Unique domain or local computer identifier
  • Relative ID: The unique RID attached to the object

Well Known SIDS

NameSID/RID ValueIdentifies
Null SIDS-1-0-0A group with no members
EveryoneS-1-1-0Generic group that automatically includes all users of the
computer
LocalS-1-2-0Users who log on physically to terminals
ConsoleS-1-2-1Users who log on to the physical console
NetworkS-1-5-2A group that includes users logged on through a network
connection.
InteractiveS-1-5-4A group that includes all users that have logged on
interactively.
ServiceS-1-5-6A group that includes all service logons
AnonymousS-1-5-7A group that includes all anonymous logon sessions
Authenticated UsersS-1-5-11A group that includes all authenticated user logons
Remote Interactive LogonS-1-5-14A group that includes all users logged on through
terminal services
Local SystemS-1-5-18A service account used by the system
AdministratorS-1-5-21-xxxx-500A user account for the System Administrator. This
account is given full control of the system.
GuestS-1-5-21-xxxx-501A built-in guest account used for users without an
account (disabled by default)
KrbtgtS-1-5-21-xxxx-502A service account used by the Kerberos KDC
Domain AdminsS-1-5-21-xxxx-512A global group of whose members are authorized to
administer the domain.
Domain UsersS-1-5-21-xxxx-513A global group that includes all domain users by default
Domain GuestsS-1-5-21-xxxx-514A global group consisting of the built-in Guest account
Domain ComputersS-1-5-21-xxxx-515A global group that includes all clients and servers
connected to the domain
AdministratorsS-1-5-32-xxxx-544A built-in group that is populated with the Administrator
and Domain Admin accounts
UsersS-1-5-32-xxxx-545A built-in group that contains all authenticated users
GuestsS-1-5-32-xxxx-546A built-in group with the default guest account held within
Power UsersS-1-5-32-xxxx-547A built-in group that by default has no members unless
added through associated group

Sources

This post is licensed under CC BY 4.0 by the author.