@@ -15,9 +15,9 @@ references:
15
15
- https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
16
16
- https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/bf62ece1c679b07b5fb49c4bae947fe24c81811f/fin6/Emulation_Plan/Phase1.md
17
17
- https://github.com/redcanaryco/atomic-red-team/blob/0f229c0e42bfe7ca736a14023836d65baa941ed2/atomics/T1087.002/T1087.002.md#atomic-test-7---adfind---enumerate-active-directory-user-objects
18
- author : Janantha Marasinghe (https://github.com/blueteam0ps), FPT.EagleEye Team, omkar72, oscd.community, Swachchhanda Shrawan Poudel (Nextron Systems)
18
+ author : Janantha Marasinghe (https://github.com/blueteam0ps), FPT.EagleEye Team, omkar72, oscd.community
19
19
date : 2021-02-02
20
- modified : 2025-02-23
20
+ modified : 2023-03-05
21
21
tags :
22
22
- attack.discovery
23
23
- attack.t1018
@@ -29,19 +29,7 @@ logsource:
29
29
category : process_creation
30
30
product : windows
31
31
detection :
32
- selection_imag :
33
- - Image|endswith : ' \AdFind.exe'
34
- - OriginalFileName : ' AdFind.exe'
35
- - Hashes|contains :
36
- - ' IMPHASH=d144de8117df2beceaba2201ad304764'
37
- - ' IMPHASH=12ce1c0f3f5837ecc18a3782408fa975'
38
- - ' IMPHASH=bca5675746d13a1f246e2da3c2217492'
39
- - ' IMPHASH=4fbf3f084fbbb2470b80b2013134df35'
40
- - ' IMPHASH=49b639b4acbecc49d72a01f357aa4930'
41
- - ' IMPHASH=53e117a96057eaf19c41380d0e87f1c2'
42
- - ' IMPHASH=680dad9e300346e05a85023965867201'
43
- - ' IMPHASH=21aa085d54992511b9f115355e468782'
44
- selection_cmd :
32
+ selection :
45
33
CommandLine|contains :
46
34
- ' domainlist'
47
35
- ' trustdmp'
@@ -62,7 +50,7 @@ detection:
62
50
- ' users_noexpire'
63
51
- ' computers_active'
64
52
- ' computers_pwdnotreqd'
65
- condition : all of selection_*
53
+ condition : selection
66
54
falsepositives :
67
55
- Legitimate admin activity
68
56
level : high
0 commit comments