Renamed AdFind Execution

Detects the use of a renamed Adfind.exe. AdFind continues to be seen across majority of breaches. It is used to domain trust discovery to plan out subsequent steps in the attack chain.

Sigma rule (View on GitHub)

 1title: Renamed AdFind Execution
 2id: df55196f-f105-44d3-a675-e9dfb6cc2f2b
 3status: test
 4description: Detects the use of a renamed Adfind.exe. AdFind continues to be seen across majority of breaches. It is used to domain trust discovery to plan out subsequent steps in the attack chain.
 5references:
 6    - https://www.joeware.net/freetools/tools/adfind/
 7    - https://thedfirreport.com/2020/05/08/adfind-recon/
 8    - https://thedfirreport.com/2021/01/11/trickbot-still-alive-and-well/
 9    - https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/
10    - https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
11    - https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/bf62ece1c679b07b5fb49c4bae947fe24c81811f/fin6/Emulation_Plan/Phase1.md
12author: Florian Roth (Nextron Systems)
13date: 2022-08-21
14modified: 2024-11-23
15tags:
16    - attack.discovery
17    - attack.t1018
18    - attack.t1087.002
19    - attack.t1482
20    - attack.t1069.002
21logsource:
22    category: process_creation
23    product: windows
24detection:
25    selection_1:
26        CommandLine|contains:
27            - 'domainlist'
28            - 'trustdmp'
29            - 'dcmodes'
30            - 'adinfo'
31            - ' dclist '
32            - 'computer_pwdnotreqd'
33            - 'objectcategory='
34            - '-subnets -f'
35            - 'name="Domain Admins"'
36            - '-sc u:'
37            - 'domainncs'
38            - 'dompol'
39            - ' oudmp '
40            - 'subnetdmp'
41            - 'gpodmp'
42            - 'fspdmp'
43            - 'users_noexpire'
44            - 'computers_active'
45            - 'computers_pwdnotreqd'
46    selection_2:
47        Hashes|contains:
48            - 'IMPHASH=BCA5675746D13A1F246E2DA3C2217492'
49            - 'IMPHASH=53E117A96057EAF19C41380D0E87F1C2'
50    selection_3:
51        OriginalFileName: 'AdFind.exe'
52    filter:
53        Image|endswith: '\AdFind.exe'
54    condition: 1 of selection* and not filter
55falsepositives:
56    - Unknown
57level: high

References

Related rules

to-top