<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Pass-the-Ticket — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/pass-the-ticket/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/pass-the-ticket/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detects Kirbi File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-kirbi-file-creation/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kirbi-file-creation/</guid><description>Detects the creation of .kirbi files, a suspicious Kerberos ticket artifact often produced by ticket export or dumping tools such as Rubeus or Mimikatz, indicating preparation for Kerberos ticket theft or Pass-The-Ticket (PTT) attacks.</description><content:encoded><![CDATA[<p>The creation of <code>.kirbi</code> files on Windows systems is a strong indicator of potential Kerberos ticket theft. These files are Kerberos ticket artifacts often associated with credential dumping and Pass-The-Ticket (PTT) attacks. Tools like Mimikatz and Rubeus are commonly used to export or dump Kerberos tickets, which are then saved as <code>.kirbi</code> files. Defenders should monitor the creation of these files, especially in unusual locations, and investigate the associated processes to determine if malicious activity is occurring. The rule provided is designed to detect these events across multiple data sources, providing a comprehensive approach to identifying this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means, such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes a Kerberos ticket dumping tool, such as Mimikatz or Rubeus.</li>
<li>The tool extracts Kerberos tickets from memory.</li>
<li>The extracted tickets are saved to a <code>.kirbi</code> file on the filesystem. This file is often created in a temporary or easily accessible location.</li>
<li>The attacker may rename or move the <code>.kirbi</code> file to evade detection or prepare it for later use.</li>
<li>The attacker uses the stolen Kerberos ticket to authenticate to other systems on the network (Pass-The-Ticket).</li>
<li>The attacker gains unauthorized access to sensitive resources or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberos ticket theft can lead to significant damage, including unauthorized access to sensitive data, lateral movement across the network, and privilege escalation. Depending on the compromised account, an attacker can potentially gain control of critical systems and data. If a domain administrator account is compromised, the entire domain could be at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kirbi File Creation</code> to your SIEM to detect the creation of <code>.kirbi</code> files.</li>
<li>Enable Sysmon FileCreate events (Event ID 11) to provide the necessary data for the <code>Kirbi File Creation</code> rule to function effectively.</li>
<li>Investigate any alerts generated by the <code>Kirbi File Creation</code> rule, focusing on the process that created the file, the location of the file, and any follow-on activity.</li>
<li>Consider blocking the execution of known Kerberos ticket dumping tools, such as Mimikatz and Rubeus.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>kerberos</category><category>pass-the-ticket</category><category>mimikatz</category><category>rubeus</category></item></channel></rss>