title: Rubeus Hack Tool author: Florian Roth date: 2018/12/19 description: Detects command line parameters used by Rubeus hack tool detection: SELECTION_1: EventID: 1 SELECTION_2: CommandLine: - '* asreproast *' - '* dump /service:krbtgt *' - '* kerberoast *' - '* createnetonly /program:*' - '* ptt /ticket:*' - '* /impersonateuser:*' - '* renew /ticket:*' - '* asktgt /user:*' - '* harvest /interval:*' - '* s4u /user:*' - '* s4u /ticket:*' - '* hash /password:*' condition: (SELECTION_1 and SELECTION_2) falsepositives: - unlikely id: 7ec2c172-dceb-4c10-92c9-87c1881b7e18 level: critical logsource: category: process_creation product: windows references: - https://www.harmj0y.net/blog/redteaming/from-kekeo-to-rubeus/ status: experimental tags: - attack.credential_access - attack.t1003 - attack.t1558.003 - attack.t1558 - attack.lateral_movement - attack.t1550.003 - attack.t1097 ruletype: SIGMA