AD Groups Or Users Enumeration Using PowerShell - ScriptBlock
Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as domain administrators.
Sigma rule (View on GitHub)
1title: AD Groups Or Users Enumeration Using PowerShell - ScriptBlock
2id: 88f0884b-331d-403d-a3a1-b668cf035603
3status: test
4description: |
5 Adversaries may attempt to find domain-level groups and permission settings.
6 The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group.
7 Adversaries may use this information to determine which users have elevated permissions, such as domain administrators.
8references:
9 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1069.002/T1069.002.md
10author: frack113
11date: 2021-12-15
12modified: 2022-12-25
13tags:
14 - attack.discovery
15 - attack.t1069.001
16logsource:
17 product: windows
18 category: ps_script
19 definition: 'Requirements: Script Block Logging must be enabled'
20detection:
21 test_2:
22 ScriptBlockText|contains: get-ADPrincipalGroupMembership
23 test_7:
24 ScriptBlockText|contains|all:
25 - get-aduser
26 - '-f '
27 - '-pr '
28 - DoesNotRequirePreAuth
29 condition: 1 of test_*
30falsepositives:
31 - Unknown
32level: low
References
Related rules
- AD Groups Or Users Enumeration Using PowerShell - PoshModule
- BloodHound Collection Files
- HackTool - Bloodhound/Sharphound Execution
- Local Groups Discovery - Linux
- Local Groups Discovery - MacOs