heroui logo

HackTool - KrbRelayUp Execution

Sigma Rules

View Source
Summary
The rule detects the execution of the KrbRelayUp tool, which is known for enabling local privilege escalation in Windows domain environments when LDAP signing is not enforced. This method, identified by various credential access techniques, allows attackers to relay Kerberos tickets and escalate their privileges to gain more control over the system. The detection mechanism monitors process creation events in Windows to identify any instances where KrbRelayUp.exe is executed, whether directly or through command-line arguments associated with its operation. Key command-line parameters are scrutinized to capture various usage patterns of this tool, allowing for effective identification of potential malicious activity related to privilege escalation. This makes the rule a vital component for defending Windows environments from specific credential exploitation attacks.
Categories
  • Windows
  • Endpoint
  • Network
Data Sources
  • Process
  • Command
Created: 2022-04-26