← Back to SOC feed Coverage →

HackTool - Impacket Tools Execution

sigma HIGH SigmaHQ
T1557.001
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-05-09T11:00:00Z · Confidence: medium

Hunt Hypothesis

Detects the execution of different compiled Windows binaries of the impacket toolset (based on names or part of their names - could lead to false positives)

Detection Rule

Sigma (Original)

title: HackTool - Impacket Tools Execution
id: 4627c6ae-6899-46e2-aa0c-6ebcb1becd19
status: test
description: Detects the execution of different compiled Windows binaries of the impacket toolset (based on names or part of their names - could lead to false positives)
references:
    - https://github.com/ropnop/impacket_static_binaries/releases/tag/0.9.21-dev-binaries
author: Florian Roth (Nextron Systems)
date: 2021-07-24
modified: 2023-02-07
tags:
    - attack.collection
    - attack.execution
    - attack.credential-access
    - attack.t1557.001
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        - Image|contains:
              - '\goldenPac'
              - '\karmaSMB'
              - '\kintercept'
              - '\ntlmrelayx'
              - '\rpcdump'
              - '\samrdump'
              - '\secretsdump'
              - '\smbexec'
              - '\smbrelayx'
              - '\wmiexec'
              - '\wmipersist'
        - Image|endswith:
              - '\atexec_windows.exe'
              - '\dcomexec_windows.exe'
              - '\dpapi_windows.exe'
              - '\findDelegation_windows.exe'
              - '\GetADUsers_windows.exe'
              - '\GetNPUsers_windows.exe'
              - '\getPac_windows.exe'
              - '\getST_windows.exe'
              - '\getTGT_windows.exe'
              - '\GetUserSPNs_windows.exe'
              - '\ifmap_windows.exe'
              - '\mimikatz_windows.exe'
              - '\netview_windows.exe'
              - '\nmapAnswerMachine_windows.exe'
              - '\opdump_windows.exe'
              - '\psexec_windows.exe'
              - '\rdp_check_windows.exe'
              - '\sambaPipe_windows.exe'
              - '\smbclient_windows.exe'
              - '\smbserver_windows.exe'
              - '\sniff_windows.exe'
              - '\sniffer_windows.exe'
              - '\split_windows.exe'
              - '\ticketer_windows.exe'
              # - '\addcomputer_windows.exe'
              # - '\esentutl_windows.exe'
              # - '\getArch_windows.exe'
              # - '\lookupsid_windows.exe'
              # - '\mqtt_check_windows.exe'
              # - '\mssqlclient_windows.exe'
              # - '\mssqlinstance_windows.exe'
              # - '\ntfs-read_windows.exe'
              # - '\ping_windows.exe'
              # - '\ping6_windows.exe'
              # - '\raiseChild_windows.exe'
              # - '\reg_windows.exe'
              # - '\registry-read_windows.exe'
              # - '\services_windows.exe'
              # - '\wmiquery_windows.exe'
    condition: selection
falsepositives:
    - Legitimate use of the impacket tools
level: high

KQL (Azure Sentinel)

imProcessCreate
| where (TargetProcessName contains "\\goldenPac" or TargetProcessName contains "\\karmaSMB" or TargetProcessName contains "\\kintercept" or TargetProcessName contains "\\ntlmrelayx" or TargetProcessName contains "\\rpcdump" or TargetProcessName contains "\\samrdump" or TargetProcessName contains "\\secretsdump" or TargetProcessName contains "\\smbexec" or TargetProcessName contains "\\smbrelayx" or TargetProcessName contains "\\wmiexec" or TargetProcessName contains "\\wmipersist") or (TargetProcessName endswith "\\atexec_windows.exe" or TargetProcessName endswith "\\dcomexec_windows.exe" or TargetProcessName endswith "\\dpapi_windows.exe" or TargetProcessName endswith "\\findDelegation_windows.exe" or TargetProcessName endswith "\\GetADUsers_windows.exe" or TargetProcessName endswith "\\GetNPUsers_windows.exe" or TargetProcessName endswith "\\getPac_windows.exe" or TargetProcessName endswith "\\getST_windows.exe" or TargetProcessName endswith "\\getTGT_windows.exe" or TargetProcessName endswith "\\GetUserSPNs_windows.exe" or TargetProcessName endswith "\\ifmap_windows.exe" or TargetProcessName endswith "\\mimikatz_windows.exe" or TargetProcessName endswith "\\netview_windows.exe" or TargetProcessName endswith "\\nmapAnswerMachine_windows.exe" or TargetProcessName endswith "\\opdump_windows.exe" or TargetProcessName endswith "\\psexec_windows.exe" or TargetProcessName endswith "\\rdp_check_windows.exe" or TargetProcessName endswith "\\sambaPipe_windows.exe" or TargetProcessName endswith "\\smbclient_windows.exe" or TargetProcessName endswith "\\smbserver_windows.exe" or TargetProcessName endswith "\\sniff_windows.exe" or TargetProcessName endswith "\\sniffer_windows.exe" or TargetProcessName endswith "\\split_windows.exe" or TargetProcessName endswith "\\ticketer_windows.exe")

Required Data Sources

Sentinel TableNotes
imProcessCreateEnsure this data connector is enabled

False Positive Guidance

MITRE ATT&CK Context

References

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_hktl_impacket_tools.yml