Detection rules › Sigma

HackTool - Rubeus Execution - ScriptBlock

Severity
high
Author
Christian Burkard (Nextron Systems), Florian Roth (Nextron Systems)
Source
upstream

Detects the execution of the hacktool Rubeus using specific command line flags

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1550.003 Use Alternate Authentication Material: Pass the Ticket
Credential AccessT1003 OS Credential Dumping, T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting
Lateral MovementT1550.003 Use Alternate Authentication Material: Pass the Ticket

Event coverage

ProviderEvent IDTitle
PowerShell4104Creating Scriptblock text (MessageNumber of MessageTotal).

Stages and Predicates

Stage 1: selection

or:
ScriptBlockText|contains: '/impersonateuser:'
ScriptBlockText|contains: 'asktgt /user:'
ScriptBlockText|contains: 'asreproast '
ScriptBlockText|contains: 'createnetonly /program:'
ScriptBlockText|contains: 'dump /luid:0x'
ScriptBlockText|contains: 'dump /service:krbtgt '
ScriptBlockText|contains: 'golden /aes256:'
ScriptBlockText|contains: 'harvest /interval:'
ScriptBlockText|contains: 'hash /password:'
ScriptBlockText|contains: 'kerberoast '
ScriptBlockText|contains: 'ptt /ticket:'
ScriptBlockText|contains: 'renew /ticket:'
ScriptBlockText|contains: 's4u /ticket:'
ScriptBlockText|contains: 's4u /user:'
ScriptBlockText|contains: 'silver /user:'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
ScriptBlockTextmatch
  • /impersonateuser:
  • asktgt /user:
  • asreproast
  • createnetonly /program:
  • dump /luid:0x
  • dump /service:krbtgt
  • golden /aes256:
  • harvest /interval:
  • hash /password:
  • kerberoast
  • ptt /ticket:
  • renew /ticket:
  • s4u /ticket:
  • s4u /user:
  • silver /user:

Neighbors

Broader alternatives (more inclusive than this rule)

These rules match a superset of what this rule catches. They cover the same events plus more. Use them if you want wider coverage and can absorb more false positives.