KrbRelayUp Attack Pattern

Detects logon events that have characteristics of events generated during an attack with KrbRelayUp and the like

Sigma rule (View on GitHub)

 1title: KrbRelayUp Attack Pattern
 2id: 749c9f5e-b353-4b90-a9c1-05243357ca4b
 3status: test
 4description: Detects logon events that have characteristics of events generated during an attack with KrbRelayUp and the like
 5references:
 6    - https://twitter.com/sbousseaden/status/1518976397364056071?s=12&t=qKO5eKHvWhAP19a50FTZ7g
 7    - https://github.com/elastic/detection-rules/blob/fb6ee2c69864ffdfe347bf3b050cb931f53067a6/rules/windows/privilege_escalation_krbrelayup_suspicious_logon.toml
 8author: '@SBousseaden, Florian Roth'
 9date: 2022/04/27
10tags:
11    - attack.privilege_escalation
12    - attack.credential_access
13logsource:
14    product: windows
15    service: security
16detection:
17    selection:
18        EventID: 4624
19        LogonType: 3
20        AuthenticationPackageName: 'Kerberos'
21        IpAddress: '127.0.0.1'
22        TargetUserSid|startswith: 'S-1-5-21-'
23        TargetUserSid|endswith: '-500'
24    condition: selection
25falsepositives:
26    - Unknown
27level: high

References

Related rules

to-top