Potential Discovery Activity Via Dnscmd.EXE
Detects an attempt to leverage dnscmd.exe to enumerate the DNS zones of a domain. DNS zones used to host the DNS records for a particular domain.
Sigma rule (View on GitHub)
1title: Potential Discovery Activity Via Dnscmd.EXE
2id: b6457d63-d2a2-4e29-859d-4e7affc153d1
3status: test
4description: Detects an attempt to leverage dnscmd.exe to enumerate the DNS zones of a domain. DNS zones used to host the DNS records for a particular domain.
5references:
6 - https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/dnscmd
7 - https://learn.microsoft.com/en-us/azure/dns/dns-zones-records
8 - https://lolbas-project.github.io/lolbas/Binaries/Dnscmd/
9author: '@gott_cyber'
10date: 2022-07-31
11modified: 2023-02-04
12tags:
13 - attack.discovery
14 - attack.execution
15 - attack.t1543.003
16logsource:
17 category: process_creation
18 product: windows
19detection:
20 selection_img:
21 Image|endswith: '\dnscmd.exe'
22 selection_cli:
23 CommandLine|contains:
24 - '/enumrecords'
25 - '/enumzones'
26 - '/ZonePrint'
27 - '/info'
28 condition: all of selection_*
29falsepositives:
30 - Legitimate administration use
31level: medium
References
Related rules
- AADInternals PowerShell Cmdlets Execution - ProccessCreation
- AADInternals PowerShell Cmdlets Execution - PsScript
- BloodHound Collection Files
- CobaltStrike Service Installations - Security
- CobaltStrike Service Installations - System