heroui logo

Rubeus Commands

Anvilogic Forge

View Source
Summary
The detection rule focuses on identifying malicious activities associated with Rubeus, a C# toolset used for Kerberos ticket manipulation and abuse. Threat actors such as Wizard Spider, linked with ransomware groups like Conti, Diavol, and Quakbot/Qbot, use Rubeus for credential access by stealing or forging Kerberos tickets. The rule employs Splunk's logic format to parse Windows Sysmon data, specifically targeting Process Events (EventCode=1). It looks for known Rubeus command patterns through keyword searches and regex matching to pinpoint executable activities that correspond to Kerberos ticket manipulation functions, such as harvesting, ticket granting, and kerberoasting. This includes a comprehensive table that captures key attributes like time, host, user, and process details, facilitating the detection of anomalous behavior stemming from Rubeus command executions and the misuse of Kerberos protocol. Consequently, this allows early detection of potential lateral movement and credential theft activities within the targeted environment.
Categories
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1558.003
  • T1558
  • T1558.002
  • T1558.001
Created: 2024-02-09