AADInternals PowerShell Cmdlets Execution - ProccessCreation
Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.
Sigma rule (View on GitHub)
1title: AADInternals PowerShell Cmdlets Execution - ProccessCreation
2id: c86500e9-a645-4680-98d7-f882c70c1ea3
3related:
4 - id: 91e69562-2426-42ce-a647-711b8152ced6
5 type: similar
6status: test
7description: Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.
8references:
9 - https://o365blog.com/aadinternals/
10 - https://github.com/Gerenios/AADInternals
11author: Austin Songer (@austinsonger), Nasreddine Bencherchali (Nextron Systems), Swachchhanda Shrawan Poudel (Nextron Systems)
12date: 2022-12-23
13modified: 2025-02-06
14tags:
15 - attack.execution
16 - attack.reconnaissance
17 - attack.discovery
18 - attack.credential-access
19 - attack.impact
20logsource:
21 product: windows
22 category: process_creation
23detection:
24 selection_img:
25 - Image|endswith:
26 - '\powershell.exe'
27 - '\powershell_ise.exe'
28 - '\pwsh.exe'
29 - OriginalFileName:
30 - 'PowerShell.Exe'
31 - 'pwsh.dll'
32 selection_cli:
33 CommandLine|contains:
34 # Since most of the cmdlets use a unique enough string which is "-AADInt" we only used that portion. For a complete list please check the references linked above
35 - 'Add-AADInt'
36 - 'ConvertTo-AADInt'
37 - 'Disable-AADInt'
38 - 'Enable-AADInt'
39 - 'Export-AADInt'
40 - 'Find-AADInt'
41 - 'Get-AADInt'
42 - 'Grant-AADInt'
43 - 'Initialize-AADInt'
44 - 'Install-AADInt'
45 - 'Invoke-AADInt'
46 - 'Join-AADInt'
47 - 'New-AADInt'
48 - 'Open-AADInt'
49 - 'Read-AADInt'
50 - 'Register-AADInt'
51 - 'Remove-AADInt'
52 - 'Reset-AADInt'
53 - 'Resolve-AADInt'
54 - 'Restore-AADInt'
55 - 'Save-AADInt'
56 - 'Search-AADInt'
57 - 'Send-AADInt'
58 - 'Set-AADInt'
59 - 'Start-AADInt'
60 - 'Unprotect-AADInt'
61 - 'Update-AADInt'
62 condition: all of selection_*
63falsepositives:
64 - Legitimate use of the library for administrative activity
65level: high
yaml
References
Related rules
- AADInternals PowerShell Cmdlets Execution - PsScript
- HackTool - WinPwn Execution
- HackTool - WinPwn Execution - ScriptBlock
- Audit CVE Event
- HackTool - CrackMapExec Execution