AD Privileged Users or Groups Reconnaissance

Detect priv users or groups recon based on 4661 eventid and known privileged users or groups SIDs

Sigma rule (View on GitHub)

 1title: AD Privileged Users or Groups Reconnaissance
 2id: 35ba1d85-724d-42a3-889f-2e2362bcaf23
 3status: test
 4description: Detect priv users or groups recon based on 4661 eventid and known privileged users or groups SIDs
 5references:
 6    - https://web.archive.org/web/20230329163438/https://blog.menasec.net/2019/02/threat-hunting-5-detecting-enumeration.html
 7author: Samir Bousseaden
 8date: 2019-04-03
 9modified: 2022-07-13
10tags:
11    - attack.discovery
12    - attack.t1087.002
13logsource:
14    product: windows
15    service: security
16    definition: 'Requirements: enable Object Access SAM on your Domain Controllers'
17detection:
18    selection:
19        EventID: 4661
20        ObjectType:
21            - 'SAM_USER'
22            - 'SAM_GROUP'
23    selection_object:
24        - ObjectName|endswith:
25              - '-512'
26              - '-502'
27              - '-500'
28              - '-505'
29              - '-519'
30              - '-520'
31              - '-544'
32              - '-551'
33              - '-555'
34        - ObjectName|contains: 'admin'
35    filter:
36        SubjectUserName|endswith: '$'
37    condition: selection and selection_object and not filter
38falsepositives:
39    - If source account name is not an admin then its super suspicious
40level: high

References

Related rules

to-top