Potential SMB Relay Attack Tool Execution
Last updated on:
In this page
Rule name | Rule type | Log sources | MITRE ATT&CK tags | Severity |
Potential SMB Relay Attack Tool Execution | Standard | Windows | Collection: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay (T1557.001), Credential Access: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay (T1557.001) | Critical |
About the rule
Rule Type
Standard
Rule Description
Detects different hacktools used for relay attacks on Windows for privilege escalation
Severity
Critical
Rule journey
Attack chain scenario
Initial access → Network scanning → SMB discovery → Relay tool execution → Credential capture → Privilege escalation
Impact
- Privilege escalation
- Credential theft
- Lateral movement
- Unauthorized access
Rule Requirement
Prerequisites
- Using Windows event viewer:
To configure process creation auditing, log in to a domain controller with domain admin credentials and open the Group Policy Management Console (GPMC) by running gpmc.msc. Create a new GPO or edit an existing one linked to the appropriate organizational unit (OU), then navigate to Advanced Audit Policy Configuration under Computer Configuration and enable both Audit Process Creation and Audit Process Termination by selecting Success for each. For deeper visibility, enable the policy to include command line information in process creation events under Administrative Templates > System > Audit Process Creation. Finally, ensure the event log channel is active by creating the registry key "Microsoft-Windows-Security-Auditing/Operational" if it doesn't already exist.
- Using Sysmon:
Download and install Sysmon from Microsoft Sysinternals, then open a Command Prompt with administrator privileges. Use a configuration file that includes process creation monitoring—such as one with a <ProcessCreate> rule—and install Sysmon using sysmon.exe -i [configfile.xml]. To ensure logging is enabled, create the registry key "Microsoft-Windows-Sysmon/Operational" under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\ if it doesn't already exist.
Criteria
Action1: actionname = "Process started" AND (PROCESSNAME contains "PetitPotam,RottenPotato,HotPotato,JuicyPotato,\just_dce_,Juicy Potato,\temp\rot.exe,\Potato.exe,\SpoolSample.exe,\Responder.exe,\smbrelayx,\ntlmrelayx,\LocalPotato" OR COMMANDLINE contains "Invoke-Tater, smbrelay, ntlmrelay,cme smb , /ntlm:NTLMhash ,Invoke-PetitPotam,.exe -t * -p " OR (COMMANDLINE contains ".exe -c "{" AND COMMANDLINE endswith "}" -z")) AND PROCESSNAME notcontains "HotPotatoes6,HotPotatoes7,HotPotatoes " select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
MITRE ATT&CK
- Collection: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay (T1557.001)
- Credential Access: Adversary-in-the-Middle - LLMNR/NBT-NS Poisoning and SMB Relay (T1557.001)
Security Standards
Enabling this rule will help you meet the security standard's requirements listed below:
- NIST SP 800-53: SI-4 – System Monitoring: Requires continuous monitoring to detect and respond to security threats.
Triggering this rule helps identify SMB relay tools early, supporting proactive system monitoring. - NIST SP 800-53: AC-2 – Account Management: Focuses on managing user accounts and controlling access.
Triggering this rule alerts administrators to potential misuse of accounts via relay-based privilege escalation. - NIST SP 800-53: AU-6 – Audit Review, Analysis, and Reporting: Mandates regular analysis of audit logs for indicators of compromise.
Triggering this rule generates critical event data to be reviewed for signs of malicious lateral movement. - NIST SP 800-61: Computer Security Incident Handling Guide: Outlines processes for detecting, analyzing, and responding to incidents.
Triggering this rule supports early detection and response to SMB relay activity, aiding incident handling teams. - NIST SP 800-137: ISCM – Information Security Continuous Monitoring: Promotes ongoing assessment of security controls and risks.
Triggering this rule strengthens continuous monitoring by detecting known attack tool execution in real time. - NIST SP 800-171: 3.1.6 – Least Privilege Principle: Limits user access to only what is necessary.
Triggering this rule helps detect unauthorized attempts to elevate privileges, reinforcing least privilege enforcement.
Author
Florian Roth (Nextron Systems)
Future actions
Known False Positives
This rule will be triggered when red teams or penetration testers execute authorized SMB relay tools during security assessments. It may also fire in lab environments where simulated attacks are used for testing detection capabilities.
Next Steps
When this rule is triggered, the following measures can be implemented:
- Identification: Identify if the flagged event is a new incident or part of an existing incident.
- Analysis: Analyze the impact and extent of the incident to comprehend the severity of the attack using Incident Workbench.
- Response: Respond promptly by initiating an automated workflow to interrupt the network connections and cease the malicious process.
- Containment: Isolate the affected system or network segment to prevent further spread or privilege abuse by the relay tool.
- Eradication: Remove the identified malicious tool, clean up scheduled tasks or services created by the attacker, and patch any exploited vulnerabilities.
Mitigation
Mitigation IDs | Mitigation Name | Description |
M1042 | Disable or Remove Feature or Program | Disable LLMNR and NetBIOS in local computer security settings or by group policy if they are not needed within an environment. (Citation: ADSecurity Windows Secure Baseline) |
M1037 | Filter Network Traffic | Use host-based security software to block LLMNR/NetBIOS traffic. Enabling SMB Signing can stop NTLMv2 relay attacks.(Citation: byt3bl33d3r NTLM Relaying)(Citation: Secure Ideas SMB Relay)(Citation: Microsoft SMB Packet Signing) |
M1031 | Network Intrusion Prevention | Network intrusion detection and prevention systems that can identify traffic patterns indicative of adversary in the middle (AiTM) activity can be used to mitigate activity at the network level. |
M1030 | Network Segmentation | Network segmentation can be used to isolate infrastructure components that do not require broad network access. This may mitigate, or at least alleviate, the scope of AiTM activity. |


