Skip to content

Commit 7a640bb

Browse files
created a new rule
1 parent 7fc8e39 commit 7a640bb

File tree

3 files changed

+50
-19
lines changed

3 files changed

+50
-19
lines changed

rules/windows/process_creation/proc_creation_win_pua_adfind_enumeration.yml

+8-18
Original file line numberDiff line numberDiff line change
@@ -3,35 +3,25 @@ id: 455b9d50-15a1-4b99-853f-8d37655a4c1b
33
related:
44
- id: 9a132afa-654e-11eb-ae93-0242ac130002
55
type: similar
6+
- id: 514e7e3e-b3b4-4a67-af60-be20f139198b
7+
type: similar
68
status: test
79
description: Detects active directory enumeration activity using known AdFind CLI flags
810
references:
911
- https://www.joeware.net/freetools/tools/adfind/
1012
- https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
1113
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1087.002/T1087.002.md
12-
author: frack113, Swachchhanda Shrawan Poudel (Nextron Systems)
14+
author: frack113
1315
date: 2021-12-13
14-
modified: 2025-02-23
16+
modified: 2023-03-05
1517
tags:
1618
- attack.discovery
1719
- attack.t1087.002
1820
logsource:
1921
product: windows
2022
category: process_creation
2123
detection:
22-
selection_img:
23-
- Image|endswith: '\AdFind.exe'
24-
- OriginalFileName: 'AdFind.exe'
25-
- Hashes|contains:
26-
- 'IMPHASH=d144de8117df2beceaba2201ad304764'
27-
- 'IMPHASH=12ce1c0f3f5837ecc18a3782408fa975'
28-
- 'IMPHASH=bca5675746d13a1f246e2da3c2217492'
29-
- 'IMPHASH=4fbf3f084fbbb2470b80b2013134df35'
30-
- 'IMPHASH=49b639b4acbecc49d72a01f357aa4930'
31-
- 'IMPHASH=53e117a96057eaf19c41380d0e87f1c2'
32-
- 'IMPHASH=680dad9e300346e05a85023965867201'
33-
- 'IMPHASH=21aa085d54992511b9f115355e468782'
34-
selection_cmd_password: # Listing password policy
24+
selection_password: # Listing password policy
3525
CommandLine|contains:
3626
- lockoutduration
3727
- lockoutthreshold
@@ -41,11 +31,11 @@ detection:
4131
- minpwdlength
4232
- pwdhistorylength
4333
- pwdproperties
44-
selection_cmd__enum_ad: # Enumerate Active Directory Admins
34+
selection_enum_ad: # Enumerate Active Directory Admins
4535
CommandLine|contains: '-sc admincountdmp'
46-
selection_cmd_enum_exchange: # Enumerate Active Directory Exchange AD Objects
36+
selection_enum_exchange: # Enumerate Active Directory Exchange AD Objects
4737
CommandLine|contains: '-sc exchaddresses'
4838
condition: 1 of selection_*
4939
falsepositives:
5040
- Authorized administrative activity
51-
level: high
41+
level: high
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
title: PUA - AdFind.EXE Execution
2+
id: 514e7e3e-b3b4-4a67-af60-be20f139198b
3+
related:
4+
- id: 455b9d50-15a1-4b99-853f-8d37655a4c1b
5+
type: similar
6+
status: experimental
7+
description: Detects execution of Adfind.exe utility, which can be used for reconnaissance in an Active directory environment
8+
references:
9+
- https://www.joeware.net/freetools/tools/adfind/
10+
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1087.002/T1087.002.md
11+
author: Swachchhanda Shrawan Poudel (Nextron Systems)
12+
date: 2025-02-26
13+
tags:
14+
- attack.discovery
15+
- attack.t1087.002
16+
logsource:
17+
product: windows
18+
category: process_creation
19+
detection:
20+
selection:
21+
- Image|endswith: '\AdFind.exe'
22+
- OriginalFileName: 'AdFind.exe'
23+
- Hashes|contains:
24+
- 'IMPHASH=d144de8117df2beceaba2201ad304764'
25+
- 'IMPHASH=12ce1c0f3f5837ecc18a3782408fa975'
26+
- 'IMPHASH=bca5675746d13a1f246e2da3c2217492'
27+
- 'IMPHASH=4fbf3f084fbbb2470b80b2013134df35'
28+
- 'IMPHASH=49b639b4acbecc49d72a01f357aa4930'
29+
- 'IMPHASH=53e117a96057eaf19c41380d0e87f1c2'
30+
- 'IMPHASH=680dad9e300346e05a85023965867201'
31+
- 'IMPHASH=21aa085d54992511b9f115355e468782'
32+
condition: selection
33+
falsepositives:
34+
- Usage of Adfind for legitimate administrative activity
35+
level: medium

rules/windows/process_creation/proc_creation_win_renamed_adfind.yml

+7-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ references:
1111
- https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/bf62ece1c679b07b5fb49c4bae947fe24c81811f/fin6/Emulation_Plan/Phase1.md
1212
author: Florian Roth (Nextron Systems)
1313
date: 2022-08-21
14-
modified: 2024-11-23
14+
modified: 2025-02-26
1515
tags:
1616
- attack.discovery
1717
- attack.t1018
@@ -47,6 +47,12 @@ detection:
4747
Hashes|contains:
4848
- 'IMPHASH=BCA5675746D13A1F246E2DA3C2217492'
4949
- 'IMPHASH=53E117A96057EAF19C41380D0E87F1C2'
50+
- 'IMPHASH=d144de8117df2beceaba2201ad304764'
51+
- 'IMPHASH=12ce1c0f3f5837ecc18a3782408fa975'
52+
- 'IMPHASH=4fbf3f084fbbb2470b80b2013134df35'
53+
- 'IMPHASH=49b639b4acbecc49d72a01f357aa4930'
54+
- 'IMPHASH=680dad9e300346e05a85023965867201'
55+
- 'IMPHASH=21aa085d54992511b9f115355e468782'
5056
selection_3:
5157
OriginalFileName: 'AdFind.exe'
5258
filter:

0 commit comments

Comments
 (0)