
Summary
The detection rule titled "ADExplorer Execution" is designed to identify the execution of Active Directory Explorer (AD Explorer) tools on endpoints. AD Explorer, part of the Sysinternals suite, provides significant capabilities for navigating and analyzing Active Directory, making it a tool of interest for threat actors aiming to explore AD structures for privileged accounts and resources. By detecting the execution of AD Explorer (identified by processes such as `ADExplorer.exe`, `ADExplorer64.exe`, or their variation `AdExp`), the rule can flag potentially malicious user behavior connected to privilege escalation or lateral movement tactics within a network. The rule utilizes system monitoring data from Windows Sysmon, leveraging event codes related to process creation and uses regex to match specific process names, collecting relevant metadata including timestamps, host names, user accounts, and parent process names. The deployment of this rule can help bolster defenses against credential access techniques that exploit AD.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1552.001
- T1003.003
Created: 2024-02-09