LogonTracer

LogonTracer

Verified 2889 Stars

Investigate malicious Windows logon by visualizing and analyzing Windows event log

JPCERTCC
May 26, 2025
2889 stars
Category
Digital-forensics
GitHub Stars
2889
Project Added On
May 26, 2025
Contributors
9

Arsenal Version Docker pull test

Concept

LogonTracer is a tool to investigate malicious logon by visualizing and analyzing Windows Active Directory event logs. This tool associates a host name (or an IP address) and account name found in logon-related events and displays it as a graph. This way, it is possible to see in which account login attempt occurs and which host is used.
This tool can visualize the following event id related to Windows logon based on this research.
* 4624: Successful logon
* 4625: Logon failure
* 4768: Kerberos Authentication (TGT Request)
* 4769: Kerberos Service Ticket (ST Request)
* 4776: NTLM Authentication
* 4672: Assign special privileges

More details are described in the following documents:
* Visualise Event Logs to Identify Compromised Accounts - LogonTracer -
* イベントログを可視化して不正使用されたアカウントを調査 (Japanese)

LogonTracer sample

Additional Analysis

LogonTracer uses PageRank, Hidden Markov model and ChangeFinder to detect malicious hosts and accounts from event log.
PageRank List
With LogonTracer, it is also possible to display event logs in a chronological order.
Timeline

Use LogonTracer

To use LogonTracer, you can:
* Install
* Use docker

Documentation

If you want to know more details, please check the LogonTracer wiki.

Demonstration

Following YouTube’s video shows how to use LogonTracer.

LogonTracer_Demonstration

Architecture

LogonTracer is written in Python and uses Neo4j for database. The following tools are used.

Tool Information

Author

JPCERTCC

Project Added On

May 26, 2025

License

Open Source

Tags

active-directory blueteam dfir event-log javascript python-3 security visualization