
Summary
The 'PowerShell Get LocalGroup Discovery' rule is designed to detect the execution of the PowerShell command `get-localgroup` and its utilization via `cmd.exe` in a Windows environment. This command is a typical indicator of information gathering that an attacker might perform in order to enumerate local groups on a target system. Detecting this activity is crucial because it can signal potential stages in an attack where adversaries seek out privileged accounts that they may later attempt to exploit for privilege escalation. The rule leverages telemetry from Endpoint Detection and Response (EDR) solutions, employing data such as process names, command line arguments, and associated event logs to correlate instances where this command is executed. The search query examines events from Sysmon and Windows Event Logs to identify and aggregate data related to potentially malicious activity, thereby allowing investigators to respond quickly to such actions.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Windows Registry
ATT&CK Techniques
- T1069
- T1069.001
Created: 2024-11-13