
Summary
This detection rule identifies the execution of the Windows OS tool klist.exe, which is frequently employed by post-exploitation frameworks such as winpeas. Utilizing data from Endpoint Detection and Response (EDR) systems, the rule monitors the execution of klist.exe, specifically analyzing process and parent process information. The ability to list or gather cached Kerberos tickets through klist.exe is significant as it can facilitate lateral movement or privilege escalation by attackers. If this activity is deemed malicious, it may pose a substantial security threat by allowing attackers to navigate within the network or elevate their privileges. The detection flow utilizes Splunk's technology to collate the event data and apply it through the `Endpoint.Processes` data model, ensuring that such potentially harmful actions are flagged and investigated promptly.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Sensor Health
ATT&CK Techniques
- T1558
Created: 2024-11-13