Suspicious setspn.exe execution

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

Credential Access (TA0006)

ATT&CK Technique

Steal or Forge Kerberos Tickets (T1558)

Severity

Low

Description

A Service Principal Name (SPN) is a unique identifier for a service, mapped to a specific account. Setspn.exe can be used to retrieve SPN information, which may indicate an attacker's attempt to "Kerberoast".

Attacker's Goals

Retrieving SPN information to perform related attacks like 'Kerberoast'.

Investigative actions

  • Investigate the user who executed setspn.exe and find out if the act was malicious.