Detection rules › Splunk

Windows AD add Self to Group

Author
Dean Luxton
Source
upstream

This analytic detects instances where a user adds themselves to an Active Directory (AD) group. This activity is a common indicator of privilege escalation, where a user attempts to gain unauthorized access to higher privileges or sensitive resources. By monitoring AD logs, this detection identifies such suspicious behavior, which could be part of a larger attack strategy aimed at compromising critical systems and data.

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1098 Account Manipulation
Privilege EscalationT1098 Account Manipulation

Event coverage

ProviderEvent IDTitle
Security-Auditing4728A member was added to a security-enabled global group.

Stages and Predicates

Stage 1: search

search EventCode=4728

Stage 2: where

where user=

Stage 3: stats

stats dc(user) AS usercount,AS user,AS user_category,AS src_user_category,AS dvc BY signature, Group_Name, src_user, dest

Stage 4: search

search `macro`

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
EventCodein
  • 4728 corpus 3 (splunk 3)