Detection rules › Elastic
Potential Kerberos Relay Attack against a Computer Account
Detects potential relay attacks by identifying coercion attempts followed by authentication events using a target server's computer account, originating from a different host. This may indicate that an attacker has captured and relayed the server's computer account hash to execute code on behalf of the compromised system.
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Defense Evasion | T1550 Use Alternate Authentication Material |
| Credential Access | T1187 Forced Authentication, T1557 Adversary-in-the-Middle, T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay |
| Lateral Movement | T1550 Use Alternate Authentication Material |
| Collection | T1557 Adversary-in-the-Middle, T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay |
Event coverage
Stages and Predicates
Stage 1: eql:file
not winlog.computer_name starts_with and file.name:"Spoolss"Stage 2: eql:authentication
not source.ip ends_with and not source.ip:"127.0.0.1" and not source.ip:"::1" and user.name:"*$" and winlog.computer_name starts_with and winlog.event_data.AuthenticationPackageName:"Kerberos" and winlog.logon.type:"network"Exclusions
Top-level NOT(...) conjuncts — predicates this rule actively suppresses.
| Stage | Field | Kind | Excluded values |
|---|---|---|---|
| 1 | computer_name | starts_with | |
| 1 | source.ip | ends_with |
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
file.name | wildcard |
|
source.ip | ne |
|
user.name | ends_with |
|
winlog.event_data.AuthenticationPackageName | wildcard |
|
winlog.logon.type | wildcard |
|
Neighbors
Often fire together
Rules that target events appearing in the same incident timelines. They pattern-match on adjacent steps of the same TTP, so an alert from one is often paired with alerts from these. Useful for triage context and for assembling chained-detection rules.
- Multiple Logon Failure Followed by Logon Success
- Potential Computer Account NTLM Relay Activity
- Potential NTLM Relay Attack against a Computer Account
- Remote Windows Service Installed
- Suspicious Service was Installed in the System
- Service Creation via Local Kerberos Authentication
- Hacktool Ruler
- Metasploit SMB Authentication
Share event IDs (chain-detection candidates)
Rules that observe the same Windows event-ID pairs as this one. If you're authoring a multi-stage / sequence rule that spans these events, these are the existing detections that already cover one or both endpoints.