← Back to SOC feed Coverage →

HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators

sigma HIGH SigmaHQ
T1219.002
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

Adversaries may be using the RemoteKrbRelay SMB Relay module to exfiltrate credentials by creating specific files associated with the attack vector. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect and mitigate potential Kerberos relay attacks that could lead to credential compromise and lateral movement.

Detection Rule

Sigma (Original)

title: HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators
id: 3ab79e90-9fab-4cdf-a7b2-6522bc742adb
status: test
description: Detects the creation of file with specific names used by RemoteKrbRelay SMB Relay attack module.
references:
    - https://github.com/CICADA8-Research/RemoteKrbRelay/blob/19ec76ba7aa50c2722b23359bc4541c0a9b2611c/Exploit/RemoteKrbRelay/Relay/Attacks/RemoteRegistry.cs#L31-L40
author: Nasreddine Bencherchali (Nextron Systems)
date: 2024-06-27
tags:
    - attack.command-and-control
    - attack.t1219.002
logsource:
    product: windows
    category: file_event
detection:
    selection:
        TargetFilename|endswith:
            - ':\windows\temp\sam.tmp'
            - ':\windows\temp\sec.tmp'
            - ':\windows\temp\sys.tmp'
    condition: selection
falsepositives:
    - Unlikely
level: high

KQL (Azure Sentinel)

imFileEvent
| where TargetFileName endswith ":\\windows\\temp\\sam.tmp" or TargetFileName endswith ":\\windows\\temp\\sec.tmp" or TargetFileName endswith ":\\windows\\temp\\sys.tmp"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_hktl_krbrelay_remote_ioc.yml