ATT&CK coverage › Technique

Account Discovery: Domain Account T1087.002

Adversaries may attempt to get a listing of domain accounts. This information can help adversaries determine which domain accounts exist to aid in follow-on behavior such as targeting specific accounts which possess particular privileges.

Events covered

10 catalog events are tagged with this technique by at least one rule.

ProviderEvent IDTitle
Sysmon1Process creation
Sysmon3Network connection
Sysmon11FileCreate
Security-Auditing4661A handle to an object was requested.
Security-Auditing4662An operation was performed on an object.
Security-Auditing4688A new process has been created.
Defender-DeviceProcessEvents9001000Process activity (any)
LDAP-Client30
PowerShell4103Payload Context: ContextInfo User Data: UserData.
PowerShell4104Creating Scriptblock text (MessageNumber of MessageTotal).

Authoring guide

Patterns shared across the 41 rules above: which fields they filter on, what specific values they look for, and what they exclude. Field names are normalized across vendors so Sigma's Image, Elastic's process.name, and Splunk's process_name collapse into one row. Each rule contributes at most once per row.

Fields filtered most (25 distinct)

The fields most rules look at when detecting this technique. The How column shows the operators authors use (eq, wildcard, regex_match, match) and how often each appears. Sample values are concrete examples to start from, not an exhaustive list.

FieldRulesHowSample values
EventID14eq 144104, 4662, 11
ScriptBlockText13eq 11, match 2, in 1"*[adsisearcher]*", Get-AdComputer , -Properties , -LDAPFilter , Invoke-SauronEye
CommandLine11match 11snapshot, users_noexpire, -subnets -f, domainlist, args
Image10ends_with 9, match 1\ADExplorer64.exe, \ADExp.exe, \ADExplorer64a.exe, \AdFind.exe, \csvde.exe
OriginalFileName7eq 7AdExp, AdFind.exe, csvde.exe, net.exe, net1.exe
Product3eq 2, match 1Sysinternals ADExplorer, SharpHound
Description3eq 2, match 1Active Directory Editor, SharpHound
ObjectName3ends_with 2, match 1, starts_with 1, in 1-512, -555, admin, S-1-5-21-, -500
ObjectType3eq 2, match 1SAM_USER, SAM_GROUP, bf967aba-0de6-11d0-a285-00aa003049e2
TargetFilename3ends_with 2, starts_with 1, eq 1.dat, _computers.json, _ous.json, C:\Program Files\WindowsApps\Microsoft., "*.sch*"
user2ends_with 2, starts_with 1$, MSOL_
AccessMask2ends_with 1, eq 1F?, 1?, 3?, 0x2d
Hashes2match 2IMPHASH=21aa085d54992511b9f115355e468782, IMPHASH=12ce1c0f3f5837ecc18a3782408fa975, IMPHASH=bca5675746d13a1f246e2da3c2217492, IMPHASH=53E117A96057EAF19C41380D0E87F1C2
file_name2in 2"*-azapplicationadmins.json", "*-azcloudappadmins.json", "*-azurecollection.zip", "*_groups.json", "*_users.json"
DestinationPort2eq 1, in 19389, "389", "636", "88"

Top indicator values (845 distinct)

Specific (field, operator, value) combinations the rules check for, ranked by how many rules under this technique use each one. The Corpus reach column counts how many rules across the entire catalog (any technique) check the same combination. High numbers point to widely-used indicators that are likely noisy on their own; combine them with another condition for useful signal. Blank means the combination is specific to rules under this technique.

FieldKindValueRules (here)Corpus reach
EventIDeq410411108
Imageends_with\ADExp.exe33
Imageends_with\ADExplorer64.exe36
Imageends_with\ADExplorer.exe36
Imageends_with\ADExplorer64a.exe34
ScriptBlockTexteq"*[adsisearcher]*"34
ProducteqSysinternals ADExplorer22
OriginalFileNameeqAdExp22
CommandLinematchsnapshot23
DescriptioneqActive Directory Editor22
ObjectTypeeqSAM_USER22
ObjectTypeeqSAM_GROUP22
ObjectNameends_with-50022
ObjectNameends_with-51222
userends_with$218
CommandLinematchname="Domain Admins"22
CommandLinematchcomputer_pwdnotreqd22
CommandLinematchdomainncs22
CommandLinematchdcmodes22
CommandLinematch-subnets -f22

Common exclusions (2 distinct)

Field/operator/value combinations that rules under this technique routinely exclude (top-level not() clauses). These are the false-positive paths the community has learned to filter out. A new rule that ignores the high-count entries here will likely fire on the same noisy paths.

FieldKindValueRules excluding
SubjectUserSideqS-1-5-181
Imageeq"*\\Windows\\system32\\mmc.exe"1

Rules under this technique

Every rule in the catalog tagged with this technique, grouped by vendor. Click a rule title for its full predicates, exclusions, and indicators.

Sigma 20 rules

Elastic 1 rule

Splunk 18 rules

Kusto Query Language 2 rules