Tracking Lateral Movement: PowerShell Remoting, WMIC, Explicit Credentials, NTLM Relay Attacks, Credential Theft and Reuse (Event IDs)
- 53 minutes ago
- 7 min read

Welcome back, folks!
If you’ve been following this series, I’ve already covered how attackers move laterally using things like named pipes, scheduled tasks, services, and registry modifications and more .Now it’s time to unpack some classic but still dangerous remote execution tricks — and how to actually hunt them down using Windows logs.
-------------------------------------------------------------------------------------------------------------
PowerShell Remoting & WMIC — Attackers’ Favorite “Admin Tools”
Here’s the deal: not every network logon (Event ID 4624, Type 3) means RDP or SMB. Sometimes, those logons come from administrative tools being misused for remote execution — particularly PowerShell Remoting, WMIC, or WinRS.
Attackers love these tools because:
They’re already installed on almost every Windows machine.
They blend in perfectly with normal IT activity.
And they use legitimate protocols (WinRM or RPC), which defenders often ignore.
WMIC (Windows Management Instrumentation Command-Line)
The WMIC /node: command lets you run commands remotely using RPC. When someone runs this:
wmic /node:cyberengage.svr process call create "cmd.exe /c C:\Public\HackBloodHound.exe"
Windows creates a WmiPrvSE.exe process on cyberengage.svr to execute that command.
Detection tip: If you see WmiPrvSE.exe spawned unexpectedly — especially running a strange command or launching tools like PowerShell, cmd.exe, or unknown binaries — that’s a huge red flag.
Log relationships to remember:
Event ID 4624 (Type 3) → Remote network logon
Parent process: WmiPrvSE.exe
Child process: The command being executed (cmd.exe, powershell.exe, etc.)
Use Sysmon Event ID 1 (Process Creation) or 4688 (Security Log) to tie it all together.
PowerShell Remoting (WinRM)
PowerShell remoting uses the WinRM service to execute PowerShell commands on remote systems. When an attacker runs:
Enter-PSSession -ComputerName cyberengage.svr -Credential Administrator
or
Invoke-Command -ComputerName cyberengage.svr -ScriptBlock { Start-Process C:\Public\HackBloodHound.exe }
On the target endpoint , you’ll see WSMProvHost.exe kick in. That’s the host process responsible for remote PowerShell sessions.
Detection tip: In your EDR or Sysmon data, look for WSMProvHost.exe as a parent of suspicious child processes (like cmd.exe, powershell.exe, rundll32.exe, etc.).
Log indicators:
Event ID 4624, Logon Type 3 (network logon)
Parent process: WSMProvHost.exe
Sysmon Event ID 1 → shows the actual command line executed remotely.
WinRS (Windows Remote Shell)
This one’s often overlooked but used heavily by adversaries. winrs.exe works over the same WinRM protocol as PowerShell remoting — but it directly runs programs instead of PowerShell commands.
Example:
winrs -r:cyberengage.svr "C:\Public\HackBloodHound.exe"
This will launch WinrsHost.exe on cyberengage.svr, which spawns cmd.exe → executes the malicious payload.
Detection stack:
Event ID 4624, Logon Type 3
Process chain: svchost.exe → WinrsHost.exe → cmd.exe → HackBloodHound.exe
Sysmon Event ID 1 to capture command-line parameters.
-------------------------------------------------------------------------------------------------------------
Explicit Credentials — Watching Attackers Switch Keys
The most underrated event types:
Event ID 4648 — “A logon was attempted using explicit credentials.”Here’s what that means: Someone (or something) explicitly provided a username/password to run a command — instead of using cached credentials from their current logon session.
So when attackers use tools like:
runas /user:Administrator cmd.exe
psexec -u cyberengage.org\user -p Welcome123 \\cyberengage.svr cmd.exe
or use Cobalt Strike modules that specify credentials — you’ll get a 4648 event.
What makes this event gold for defenders is that it’s logged on the source system — the machine the attacker is coming from, not just the one they’re moving to.
That means you can finally track the attack chain backwards — see where lateral movement originated.
How to Investigate 4648s
4624 Logon Type 9 = Successful logon with explicit credentials
4648 = “Tool used explicit credentials” (even if it’s the same user account)
If you see a 4648 → look at:
“Target Server” field — if it shows localhost, it’s inbound; if it shows another host, it’s outbound.
The username and process that initiated it.
The timestamp — match it against process creation or PowerShell logs.
Pro tip:
Filter out the noise (computer accounts, M365 services, etc.) — what remains is almost always either:
Admins doing maintenance, or
Attackers moving laterally
-------------------------------------------------------------------------------------------------------------
NTLM Relay Attacks — Spotting the Subtle Network Trick
Now, for the fun part. NTLM relay attacks don’t “crack” passwords — they just reuse authentication requests to trick another system into accepting them.
So what happens in the logs?
Event ID 4624 on Server will show:
Workstation Name: Client
Source Network Address: IP of Server
That mismatch is your giveaway.
This “split identity” is a strong sign of NTLM relay in action.
To confirm:
Correlate the IPs — is the workstation name and source IP inconsistent?
If DHCP is used, grab DHCP lease logs to confirm which IP belongs to which device.
NTLM relay attacks often accompany SMB traffic anomalies (e.g., access to ADMIN$, IPC$ shares.
-------------------------------------------------------------------------------------------------------------
Combined Up
Recap:
Technique | Key Parent Process | Log/Event IDs | Detection Clue |
WMIC | WmiPrvSE.exe | 4624 (Type 3), Sysmon 1 | Suspicious child processes |
PowerShell Remoting | WSMProvHost.exe | 4624, Sysmon 1 | PowerShell remote commands |
WinRS | WinrsHost.exe | 4624 | Command execution via WinRM |
Explicit Credentials | varies | 4648, 4624 Type 9 | Source-based credential use |
NTLM Relay | N/A | 4624 | Workstation name ≠ IP address |
-------------------------------------------------------------------------------------------------------------
Credential Theft and Reuse
Credential theft and reuse attacks often exploit weaker encryption types and legacy authentication protocols (NTLM) to move laterally through a Windows domain.
Key detection points lie in Kerberos event IDs (4768, 4769) and NTLM authentication logs (4624, 4776).
1. Abuse of Weak Kerberos Encryption (RC4-HMAC-MD5)
Attackers often force the use of weaker encryption types to speed up offline password cracking or perform “Overpass-the-Hash” (pass-the-key) attacks.
Common Scenarios:
Attack Type | Description | Key Event ID(s) | Detection Indicator |
Kerberoasting | Attackers request service tickets encrypted with weak RC4-HMAC-MD5 to brute-force service account passwords offline. | 4769 | Encryption Type: 0x17 or 0x18 |
Overpass-the-Hash | Attackers use a stolen NT hash to request a TGT using RC4 encryption. | 4768 | Encryption Type or (post-Jan 2025) Session Type: 0x17 / 0x18 |
Key Log Artifacts:
Event ID 4769 – Service Ticket Request
Ticket Encryption Type: 0x17 (RC4-HMAC-MD5)
Event ID 4768 – TGT Request
Ticket Encryption Type: 0x17 Session Encryption Type: 0x17
(Post-Jan 2025 patch introduces more fields for encryption visibility.)
Why RC4 Matters
RC4-HMAC-MD5 (0x17) is a legacy encryption type.
AES128 (0x11) or AES256 (0x12) are default for modern environments.
Seeing frequent 0x17 or 0x18 tickets → highly suspicious, unless legacy systems exist.
Defender Tip:
Hunt for Event IDs 4768/4769 where Encryption Type = 0x17 or 0x18.Filter out legacy systems, then review recent TGS/TGT requests by privileged or service accounts.
2. NTLM and Pass-the-Hash Detection
Even with Kerberos as the default protocol, NTLMv2 authentication still appears — especially in legacy or IP-based connections. Attackers exploit NTLM through pass-the-hash, relay, or forced authentication attacks.
Detection via Logs:
Log Type | Event ID | Description |
Account Logon | 4776 | NTLMv2 authentication attempt |
Logon Success (Network) | 4624 | Check for Authentication Package: NTLM and Package Name (NTLM only): NTLM V2 |
Normal vs Suspicious:
Normal: Kerberos authentication seen (Package Name: -)
Suspicious: NTLMv2 used on systems that normally use Kerberos(e.g., sudden NTLMv2 activity on domain controllers or file servers)
Sample 4624 Log (NTLMv2)
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Package Name (NTLM only): NTLM V2
Key Length: 128
Hunt Strategy:
Look for unusual NTLMv2 authentications in Event IDs 4624 / 4776.
Correlate with 4648 (Explicit Credentials) or 4624 Logon Type 9 to trace the origin.
Watch for sudden NTLMv2 spikes or logons to unfamiliar hosts.
3. Post-Jan 2025 Microsoft Patch — What Changed?
Microsoft’s January 2025 update enhanced Event ID 4768 and 4769 logs:
Added new fields:
Session Encryption Type
Pre-Authentication Encryption Type
Long-Term Key Type visibility
Enables defenders to differentiate client-supported encryption vs DC-issued encryption.
Greatly improves detection of RC4 downgrade or forced-weak encryption scenarios.
4. Other Lateral Movement Indicators
Technique | Event ID | What to Look For |
Credential switching (RunAs) | 4648 | Logs explicit use of credentials; indicates lateral move origin |
Logon Type 9 (NewCredentials) | 4624 | Indicates session initiated with explicit credentials |
Delegation abuse | 4624 + abnormal access patterns | Delegated service accounts connecting to new/unexpected systems |
Coercion/NTLM Relay | 4624 | Mismatch between Workstation Name and Source Network Address |
Quick Hunt Queries (SIEM Examples)
Kerberoasting
SecurityEvent
| where EventID == 4769
| where TicketEncryptionType in ("0x17", "0x18")
| project TimeGenerated, TargetUserName, ServiceName, TicketEncryptionType
Overpass-the-Hash
SecurityEvent
| where EventID == 4768
| where SessionEncryptionType in ("0x17", "0x18") or TicketEncryptionType in ("0x17", "0x18")
| project TimeGenerated, TargetUserName, IpAddress, Computer
NTLMv2 Usage
SecurityEvent
| where EventID == 4624 and AuthenticationPackageName == "NTLM"
| project TimeGenerated, TargetUserName, IpAddress, WorkstationName
-------------------------------------------------------------------------------------------------------------
Summary
Attack Type | Key Event IDs | Indicator | What It Means |
Kerberoasting | 4769 | RC4-HMAC-MD5 (0x17) | Weak encryption used for service tickets |
Overpass-the-Hash | 4768 | RC4-HMAC-MD5 (0x17) | TGT requested using NT hash |
Pass-the-Hash | 4624, 4776 | NTLMv2 logons | Reuse of stolen NTLM hash |
Credential Switching | 4648, 4624 (Type 9) | Explicit credentials | Lateral movement initiation |
NTLM Relay | 4624 | Hostname-IP mismatch | Relayed authentication |
-------------------------------------------------------------------------------------------------------------
Bonus:
Abuse of Administrative Credentials & Tools
Once attackers compromise high-privileged accounts like Domain Admins or service accounts, they effectively inherit legitimate administrative rights — becoming "unpaid administrators."
They can now:
Control much of the environment (domain, servers, endpoints).
Use legitimate tools for remote management and execution such as:
RDP, VNC, PowerShell, PsExec, WMIC, and Group Policy.
Patch management and software deployment tools to push malicious payloads.
Detection & Defense
Restrict and monitor accounts used for deployment.
Use unique accounts (not Domain Admins) for patching.
Limit deployment windows (detect off-hour use).
Maintain decoy/test systems to log and analyze deployment activities.
Watch for unexpected GPO changes or new deployment tasks.
Lateral Movement via Vulnerability Exploitation
When credentials aren’t available or remote access is blocked, attackers turn to exploiting vulnerabilities to move laterally.
Trends
Vulnerability exploitation is on the rise — both for initial access and lateral movement.
Zero-days increasingly used by state-sponsored actors.
Detection Methods
Crash / Exploit Detection:
Event logs showing crashes or memory corruption.
Microsoft Exploit Guard / antivirus telemetry.
Process Creation Monitoring (Event ID 4688):
Detect abnormal parent-child process chains (e.g., IIS worker spawning cmd.exe).
Watch for code injection, new handles, and unusual command shells.
Application control / EDR logs.
Threat intelligence to track newly exploited vulnerabilities.
Memory forensics for hidden or injected processes.
-------------------------------------------------------------------------------------------------------------
Wrapping up:
Effective lateral movement detection hinges on visibility, context, and restraint of privilege. Attackers exploit legitimate pathways; defenders must therefore combine behavioral monitoring, account segregation, and timely patching to break the chain before impact.
-------------------------------------------Dean----------------------------------------------------------
