Renamed AdFind Execution
Detects the use of a renamed Adfind.exe. AdFind continues to be seen across majority of breaches. It is used to domain trust discovery to plan out subsequent steps in the attack chain.
Sigma rule (View on GitHub)
1title: Renamed AdFind Execution
2id: df55196f-f105-44d3-a675-e9dfb6cc2f2b
3status: test
4description: Detects the use of a renamed Adfind.exe. AdFind continues to be seen across majority of breaches. It is used to domain trust discovery to plan out subsequent steps in the attack chain.
5references:
6 - https://www.joeware.net/freetools/tools/adfind/
7 - https://thedfirreport.com/2020/05/08/adfind-recon/
8 - https://thedfirreport.com/2021/01/11/trickbot-still-alive-and-well/
9 - https://www.microsoft.com/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/
10 - https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
11 - https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/bf62ece1c679b07b5fb49c4bae947fe24c81811f/fin6/Emulation_Plan/Phase1.md
12author: Florian Roth (Nextron Systems)
13date: 2022-08-21
14modified: 2024-11-23
15tags:
16 - attack.discovery
17 - attack.t1018
18 - attack.t1087.002
19 - attack.t1482
20 - attack.t1069.002
21logsource:
22 category: process_creation
23 product: windows
24detection:
25 selection_1:
26 CommandLine|contains:
27 - 'domainlist'
28 - 'trustdmp'
29 - 'dcmodes'
30 - 'adinfo'
31 - ' dclist '
32 - 'computer_pwdnotreqd'
33 - 'objectcategory='
34 - '-subnets -f'
35 - 'name="Domain Admins"'
36 - '-sc u:'
37 - 'domainncs'
38 - 'dompol'
39 - ' oudmp '
40 - 'subnetdmp'
41 - 'gpodmp'
42 - 'fspdmp'
43 - 'users_noexpire'
44 - 'computers_active'
45 - 'computers_pwdnotreqd'
46 selection_2:
47 Hashes|contains:
48 - 'IMPHASH=BCA5675746D13A1F246E2DA3C2217492'
49 - 'IMPHASH=53E117A96057EAF19C41380D0E87F1C2'
50 selection_3:
51 OriginalFileName: 'AdFind.exe'
52 filter:
53 Image|endswith: '\AdFind.exe'
54 condition: 1 of selection* and not filter
55falsepositives:
56 - Unknown
57level: high
References
Related rules
- PUA - AdFind Suspicious Execution
- AdFind Discovery
- Potential Active Directory Reconnaissance/Enumeration Via LDAP
- BloodHound Collection Files
- HackTool - Bloodhound/Sharphound Execution