heroui logo

Rubeus Kerberos Ticket Exports Through Winlogon Access

Splunk Security Content

View Source
Summary
This detection rule identifies potential abuse of the winlogon.exe system process, which is often targeted by adversaries using the Rubeus tool to extract Kerberos tickets from memory. This activity can signify an impending pass-the-ticket attack, where attackers utilize stolen Kerberos tickets for lateral movement across networks. The rule is based on Sysmon EventCode 10 logs, focusing on processes that gain handles to winlogon.exe with escalated access rights. Correct identification and response to this behavior is critical for maintaining system integrity and security, as successful execution could allow attackers to bypass standard access controls, escalate privileges, and sustain footholds within a network environment, leading to significant security breaches.
Categories
  • Endpoint
Data Sources
  • Pod
  • Image
  • Process
  • Command
ATT&CK Techniques
  • T1550
  • T1550.003
Created: 2024-11-13