XQL - Hunt for Kerberos Relay Up Activity

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

XQL - Hunt for Kerberos Relay Up Activity

L3 Networker

Just posting, if this is useful for someone who might be hunting for Kerberos Relay Up (Privilege Escalation on Windows System) Activity.

The purpose of this hunt is to look for suspicious logon on windows system using Kerberos Auth Package where the source of logon is localhost IP and user account is Administrator SID.

dataset = xdr_data
| filter event_type = ENUM.EVENT_LOG
| filter action_evtlog_event_id = 4624
| alter
        auth_package = arrayindex(regextract(action_evtlog_message,"Authentication Package:\s(\w+)"),0),
        network = arrayindex(regextract(action_evtlog_message,"Source Network Address:\s(.*)\r\n"),0),
        logon_type = arrayindex(regextract(action_evtlog_message,"Logon Type:\s+(\d+)\r\n"),0),
        sid = arrayindex(regextract(action_evtlog_message,"Security ID:\s+(.*?-500)\r\n"),0)
| filter auth_package = "Kerberos" and logon_type = "3" and sid ~= ".*500" and network in ("127.0.0.1","::1")
| fields
_time as Time,
agent_hostname as Host,
agent_ip_addresses as IP,
auth_package,sid,logon_type,network as Event_Log_Source_Network,
actor_process_image_name as Process

Please feel free to suggest if anything can be improved.

Thank you.

Kind Regards
KS
1 REPLY 1

L4 Transporter

Thanks @KanwarSingh01 

for sure it will be useful for many people 

KR,

Luis 

  • 2135 Views
  • 1 replies
  • 2 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!