heroui logo

Domain Group Discovery With Wmic

Splunk Security Content

View Source
Summary
The detection rule "Domain Group Discovery With Wmic" identifies potentially malicious use of the Windows Management Instrumentation Command-line (WMIC) tool to enumerate domain groups. This analytic monitors for command-line executions of `wmic.exe` specifically targeting Active Directory (AD) group information. The rule uses data collected from Endpoint Detection and Response (EDR) agents and focuses on various logs such as Sysmon EventID 1 and Windows Event Log Security 4688. The primary goal of this detection is to uncover reconnaissance activities conducted by adversaries, allowing them to gain insight into the structure of Active Directory and potentially leading to further attacks like privilege escalation or lateral movement in the network. By analyzing command-line executions where `wmic` is used alongside specific parameters indicating a search for Active Directory group information, security teams can identify and respond to suspicious behavior proactively.
Categories
  • Windows
  • Endpoint
  • Identity Management
  • Infrastructure
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1069
  • T1069.002
Created: 2024-12-10