Active Directory Group Enumeration With Get-AdGroup
Detects usage of the "Get-AdGroup" cmdlet to enumerate Groups within Active Directory
Sigma rule (View on GitHub)
1title: Active Directory Group Enumeration With Get-AdGroup
2id: 8c3a6607-b7dc-4f0d-a646-ef38c00b76ee
3status: test
4description: Detects usage of the "Get-AdGroup" cmdlet to enumerate Groups within Active Directory
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1018/T1018.md
7author: frack113
8date: 2022-03-17
9modified: 2022-11-17
10tags:
11 - attack.discovery
12 - attack.t1069.002
13logsource:
14 product: windows
15 category: ps_script
16 definition: 'Requirements: Script Block Logging must be enabled'
17detection:
18 selection:
19 ScriptBlockText|contains|all:
20 - 'Get-AdGroup '
21 - '-Filter'
22 condition: selection
23falsepositives:
24 - Unknown
25level: low
References
Related rules
- BloodHound Collection Files
- HackTool - Bloodhound/Sharphound Execution
- HackTool - SharpView Execution
- Malicious PowerShell Commandlets - PoshModule
- Malicious PowerShell Commandlets - ProcessCreation