AdFind Discovery

AdFind has been seen in numerous intrusions. The threat actor(s) ran these commands.

Sigma rule (View on GitHub)

 1title: AdFind Discovery
 2id: 50046619-1037-49d7-91aa-54fc92923604
 3status: stable
 4description: AdFind has been seen in numerous intrusions. The threat actor(s) ran these commands.
 5author: 'The DFIR Report'
 6date: 2022-05-14
 7modified: 2024-02-23
 8references:
 9    - https://thedfirreport.com/2020/05/08/adfind-recon/
10    - https://thedfirreport.com/?s=adfind
11logsource:
12    category: process_creation
13    product: windows
14detection:
15    selection:
16        CommandLine|contains:
17            - '-gcb -sc trustdmp'
18            - '-f "(objectcategory=group)"'
19            - '-f (objectcategory=group)'
20            - '-subnets -f (objectCategory=subnet)'
21            - '-sc trustdmp'
22            - '-f "(objectcategory=organizationalUnit)"'
23            - '-f (objectcategory=organizationalUnit)'
24            - '-f "objectcategory=computer"'
25            - '-f objectcategory=computer'
26            - '-f "(objectcategory=person)"'
27            - '-f (objectcategory=person)'
28    condition: selection
29falsepositives:
30    - Legitimate Administrator using tool for Active Directory querying.
31level: medium
32tags:
33    - attack.discovery
34    - attack.t1018
35    - attack.t1482
36    - attack.t1069.002
37    - attack.t1087.002
38    - attack.s0552

References

Related rules

to-top