PUA - Suspicious ActiveDirectory Enumeration Via AdFind.EXE
Detects active directory enumeration activity using known AdFind CLI flags
Sigma rule (View on GitHub)
1title: PUA - Suspicious ActiveDirectory Enumeration Via AdFind.EXE
2id: 455b9d50-15a1-4b99-853f-8d37655a4c1b
3related:
4 - id: 9a132afa-654e-11eb-ae93-0242ac130002
5 type: similar
6 - id: 514e7e3e-b3b4-4a67-af60-be20f139198b
7 type: similar
8status: test
9description: Detects active directory enumeration activity using known AdFind CLI flags
10references:
11 - https://www.joeware.net/freetools/tools/adfind/
12 - https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
13 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1087.002/T1087.002.md
14author: frack113
15date: 2021-12-13
16modified: 2023-03-05
17tags:
18 - attack.discovery
19 - attack.t1087.002
20logsource:
21 product: windows
22 category: process_creation
23detection:
24 selection_password: # Listing password policy
25 CommandLine|contains:
26 - lockoutduration
27 - lockoutthreshold
28 - lockoutobservationwindow
29 - maxpwdage
30 - minpwdage
31 - minpwdlength
32 - pwdhistorylength
33 - pwdproperties
34 selection_enum_ad: # Enumerate Active Directory Admins
35 CommandLine|contains: '-sc admincountdmp'
36 selection_enum_exchange: # Enumerate Active Directory Exchange AD Objects
37 CommandLine|contains: '-sc exchaddresses'
38 condition: 1 of selection_*
39falsepositives:
40 - Authorized administrative activity
41level: high
References
Related rules
- PUA - AdFind.EXE Execution
- Renamed AdFind Execution
- AD Privileged Users or Groups Reconnaissance
- Active Directory Computers Enumeration With Get-AdComputer
- Active Directory Structure Export Via Csvde.EXE