Detection rules › Sigma
PUA - AdFind Suspicious Execution
Detects AdFind execution with common flags seen used during attacks
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Discovery | T1018 Remote System Discovery, T1069.002 Permission Groups Discovery: Domain Groups, T1087.002 Account Discovery: Domain Account, T1482 Domain Trust Discovery |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
| Security-Auditing | 4688 | A new process has been created. |
Stages and Predicates
Stage 1: selection
or:
CommandLine|contains: ' oudmp '
CommandLine|contains: '-sc dclist'
CommandLine|contains: '-sc u:'
CommandLine|contains: '-subnets -f'
CommandLine|contains: adinfo
CommandLine|contains: computer_pwdnotreqd
CommandLine|contains: computers_active
CommandLine|contains: computers_pwdnotreqd
CommandLine|contains: dcmodes
CommandLine|contains: domainlist
CommandLine|contains: domainncs
CommandLine|contains: dompol
CommandLine|contains: fspdmp
CommandLine|contains: gpodmp
CommandLine|contains: 'name="Domain Admins"'
CommandLine|contains: 'objectcategory='
CommandLine|contains: subnetdmp
CommandLine|contains: trustdmp
CommandLine|contains: users_noexpire
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
CommandLine | match |
|