Detection rules › Sigma

PUA - Suspicious ActiveDirectory Enumeration Via AdFind.EXE

Severity
high
Author
frack113
Source
upstream

Detects active directory enumeration activity using known AdFind CLI flags

MITRE ATT&CK coverage

TacticTechniques
DiscoveryT1087.002 Account Discovery: Domain Account

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: 1 of selection_password

or:
CommandLine|contains: lockoutduration
CommandLine|contains: lockoutobservationwindow
CommandLine|contains: lockoutthreshold
CommandLine|contains: maxpwdage
CommandLine|contains: minpwdage
CommandLine|contains: minpwdlength
CommandLine|contains: pwdhistorylength
CommandLine|contains: pwdproperties

Stage 2: 1 of selection_enum_ad

CommandLine|contains: '-sc admincountdmp'

Stage 3: 1 of selection_enum_exchange

CommandLine|contains: '-sc exchaddresses'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • -sc admincountdmp
  • -sc exchaddresses
  • lockoutduration
  • lockoutobservationwindow
  • lockoutthreshold
  • maxpwdage
  • minpwdage
  • minpwdlength
  • pwdhistorylength
  • pwdproperties