User Discovery And Export Via Get-ADUser Cmdlet
Detects usage of the Get-ADUser cmdlet to collect user information and output it to a file
Sigma rule (View on GitHub)
1title: User Discovery And Export Via Get-ADUser Cmdlet
2id: 1114e048-b69c-4f41-bc20-657245ae6e3f
3related:
4 - id: c2993223-6da8-4b1a-88ee-668b8bf315e9
5 type: similar
6status: test
7description: Detects usage of the Get-ADUser cmdlet to collect user information and output it to a file
8references:
9 - http://blog.talosintelligence.com/2022/09/lazarus-three-rats.html
10 - https://www.microsoft.com/en-us/security/blog/2022/10/18/defenders-beware-a-case-for-post-ransomware-investigations/
11author: Nasreddine Bencherchali (Nextron Systems)
12date: 2022-09-09
13modified: 2022-11-17
14tags:
15 - attack.discovery
16 - attack.t1033
17logsource:
18 category: process_creation
19 product: windows
20detection:
21 selection_img:
22 - Image|endswith:
23 - '\powershell.exe'
24 - '\pwsh.exe'
25 - OriginalFileName:
26 - 'PowerShell.EXE'
27 - 'pwsh.dll'
28 selection_cli:
29 CommandLine|contains|all:
30 - 'Get-ADUser '
31 - ' -Filter \*'
32 CommandLine|contains:
33 - ' > '
34 - ' | Select '
35 - 'Out-File'
36 - 'Set-Content'
37 - 'Add-Content'
38 condition: all of selection_*
39falsepositives:
40 - Legitimate admin scripts may use the same technique, it's better to exclude specific computers or users who execute these commands or scripts often
41level: medium
References
Related rules
- Cisco Discovery
- Computer Discovery And Export Via Get-ADComputer Cmdlet
- Computer Discovery And Export Via Get-ADComputer Cmdlet - PowerShell
- Enumerate All Information With Whoami.EXE
- Get-ADUser Enumeration Using UserAccountControl Flags