KrbRelayUp Service Installation
Detects service creation from KrbRelayUp tool used for privilege escalation in Windows domain environments where LDAP signing is not enforced (the default settings)
Sigma rule (View on GitHub)
 1title: KrbRelayUp Service Installation
 2id: e97d9903-53b2-41fc-8cb9-889ed4093e80
 3status: test
 4description: Detects service creation from KrbRelayUp tool used for privilege escalation in Windows domain environments where LDAP signing is not enforced (the default settings)
 5references:
 6    - https://github.com/Dec0ne/KrbRelayUp
 7author: Sittikorn S, Tim Shelton
 8date: 2022-05-11
 9modified: 2022-10-05
10tags:
11    - attack.persistence
12    - attack.privilege-escalation
13    - attack.t1543
14logsource:
15    product: windows
16    service: system
17detection:
18    selection:
19        EventID: 7045
20        ServiceName: 'KrbSCM'
21    condition: selection
22falsepositives:
23    - Unknown
24level: high
References
Related rules
- CodeIntegrity - Blocked Driver Load With Revoked Certificate
- CodeIntegrity - Blocked Image/Driver Load For Policy Violation
- PUA - Process Hacker Driver Load
- PUA - System Informer Driver Load
- Service Installed By Unusual Client - Security