
Summary
The rule identifies the suspicious execution of the `wmic.exe` command-line utility for domain account discovery on Windows systems. This detection is crucial as such activities often precede malicious actions like lateral movement or privilege escalation. By analyzing logs from Endpoint Detection and Response (EDR) agents, the rule looks for specific command patterns that indicate an attempt to query user accounts within a domain, particularly through LDAP (Lightweight Directory Access Protocol). The use of command-line arguments such as `/NAMESPACE:\\root\directory\ldap`, `ds_user`, `GET`, and `ds_samaccountname` focuses on actions that are characteristic of domain enumeration attempts. Confirming such behavior as malicious can lead to significant security incidents, making timely detection critical.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
- File
- Process
ATT&CK Techniques
- T1087
- T1087.002
Created: 2024-11-13