← Back to SOC feed Coverage →

Potential SMB Relay Attack Tool Execution

sigma CRITICAL SigmaHQ
T1557.001
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-05-09T23:00:01Z · Confidence: medium

Hunt Hypothesis

Detects different hacktools used for relay attacks on Windows for privilege escalation

Detection Rule

Sigma (Original)

title: Potential SMB Relay Attack Tool Execution
id: 5589ab4f-a767-433c-961d-c91f3f704db1
status: test
description: Detects different hacktools used for relay attacks on Windows for privilege escalation
references:
    - https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/
    - https://pentestlab.blog/2017/04/13/hot-potato/
    - https://github.com/ohpe/juicy-potato
    - https://hunter2.gitbook.io/darthsidious/other/war-stories/domain-admin-in-30-minutes
    - https://hunter2.gitbook.io/darthsidious/execution/responder-with-ntlm-relay-and-empire
    - https://www.localpotato.com/
author: Florian Roth (Nextron Systems)
date: 2021-07-24
modified: 2023-02-14
tags:
    - attack.collection
    - attack.execution
    - attack.credential-access
    - attack.t1557.001
logsource:
    category: process_creation
    product: windows
detection:
    selection_pe:
        Image|contains:
            - 'PetitPotam'
            - 'RottenPotato'
            - 'HotPotato'
            - 'JuicyPotato'
            - '\just_dce_'
            - 'Juicy Potato'
            - '\temp\rot.exe'
            - '\Potato.exe'
            - '\SpoolSample.exe'
            - '\Responder.exe'
            - '\smbrelayx'
            - '\ntlmrelayx'
            - '\LocalPotato'
    selection_script:
        CommandLine|contains:
            - 'Invoke-Tater'
            - ' smbrelay'
            - ' ntlmrelay'
            - 'cme smb '
            - ' /ntlm:NTLMhash '
            - 'Invoke-PetitPotam'
            - '.exe -t * -p '  # JuicyPotatoNG pattern https://github.com/antonioCoco/JuicyPotatoNG
    selection_juicypotato_enum:  # appears when JuicyPotatoNG is used with -b
        CommandLine|contains: '.exe -c "{'
        CommandLine|endswith: '}" -z'
    filter_hotpotatoes:  # known goodware https://hotpot.uvic.ca/
        Image|contains:
            - 'HotPotatoes6'
            - 'HotPotatoes7'
            - 'HotPotatoes ' # Covers the following: 'HotPotatoes 6', 'HotPotatoes 7', 'HotPotatoes Help', 'HotPotatoes Tutorial'
    condition: 1 of selection_* and not 1 of filter_*
falsepositives:
    - Legitimate files with these rare hacktool names
level: critical

KQL (Azure Sentinel)

imProcessCreate
| where ((TargetProcessName contains "PetitPotam" or TargetProcessName contains "RottenPotato" or TargetProcessName contains "HotPotato" or TargetProcessName contains "JuicyPotato" or TargetProcessName contains "\\just_dce_" or TargetProcessName contains "Juicy Potato" or TargetProcessName contains "\\temp\\rot.exe" or TargetProcessName contains "\\Potato.exe" or TargetProcessName contains "\\SpoolSample.exe" or TargetProcessName contains "\\Responder.exe" or TargetProcessName contains "\\smbrelayx" or TargetProcessName contains "\\ntlmrelayx" or TargetProcessName contains "\\LocalPotato") or (TargetProcessCommandLine contains "Invoke-Tater" or TargetProcessCommandLine contains " smbrelay" or TargetProcessCommandLine contains " ntlmrelay" or TargetProcessCommandLine contains "cme smb " or TargetProcessCommandLine contains " /ntlm:NTLMhash " or TargetProcessCommandLine contains "Invoke-PetitPotam" or (TargetProcessCommandLine contains ".exe -t " and TargetProcessCommandLine contains " -p ")) or (TargetProcessCommandLine contains ".exe -c \"{" and TargetProcessCommandLine endswith "}\" -z")) and (not((TargetProcessName contains "HotPotatoes6" or TargetProcessName contains "HotPotatoes7" or TargetProcessName contains "HotPotatoes ")))

Required Data Sources

Sentinel TableNotes
imProcessCreateEnsure this data connector is enabled

False Positive Guidance

MITRE ATT&CK Context

References

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_hktl_relay_attacks_tools.yml