Suspicious Kerberos Ticket Request via CLI

Detects suspicious Kerberos ticket requests via command line using System.IdentityModel.Tokens.KerberosRequestorSecurityToken class. Threat actors may use command line interfaces to request Kerberos tickets for service accounts in order to perform offline password cracking attacks commonly known as Kerberoasting or other Kerberos ticket abuse techniques like silver ticket attacks.

Sigma rule (View on GitHub)

 1title: Suspicious Kerberos Ticket Request via CLI
 2id: caa9a802-8bd8-4b9e-a5cd-4d6221670219
 3related:
 4    - id: a861d835-af37-4930-bcd6-5b178bfb54df
 5      type: similar
 6status: experimental
 7description: |
 8    Detects suspicious Kerberos ticket requests via command line using System.IdentityModel.Tokens.KerberosRequestorSecurityToken class.
 9    Threat actors may use command line interfaces to request Kerberos tickets for service accounts in order to
10    perform offline password cracking attacks commonly known as Kerberoasting or other Kerberos ticket abuse
11    techniques like silver ticket attacks.    
12references:
13    - https://www.huntress.com/blog/gootloader-threat-detection-woff2-obfuscation
14    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1558.003/T1558.003.md#atomic-test-4---request-a-single-ticket-via-powershell
15    - https://learn.microsoft.com/en-us/dotnet/api/system.identitymodel.tokens.kerberosrequestorsecuritytoken?view=netframework-4.8.1
16author: Swachchhanda Shrawan Poudel (Nextron Systems)
17date: 2025-11-18
18tags:
19    - attack.credential-access
20    - attack.t1558.003
21logsource:
22    category: process_creation
23    product: windows
24detection:
25    selection_img:
26        - Image|endswith:
27              - '\powershell.exe'
28              - '\pwsh.exe'
29        - OriginalFileName:
30              - 'powershell.exe'
31              - 'pwsh.dll'
32    selection_cli:
33        CommandLine|contains|all:
34            - 'System.IdentityModel.Tokens.KerberosRequestorSecurityToken'
35            - '.GetRequest()'
36    condition: all of selection_*
37falsepositives:
38    - Legitimate command line usage by administrators or security tools.
39level: high

References

Related rules

to-top