heroui logo

PUA - Adidnsdump Execution

Sigma Rules

View Source
Summary
The detection rule named 'PUA - Adidnsdump Execution' focuses on identifying the execution of the 'adidnsdump' tool, which is used for querying and modifying DNS records in Active Directory integrated DNS via LDAP. This is particularly relevant for threat actors engaged in reconnaissance within internal networks. The rule specifically looks for the invocation of this tool via Python, where the process creation is tracked with the parameters indicating the capture of this specific command. The rule operates by monitoring processes that end with 'python.exe' and contain the 'adidnsdump' command line argument, signifying potential misuse for resource gathering by unauthorized users. The detection level is marked as low, implying the presence of potential false positives, especially from legitimate uses of similar tools.
Categories
  • Windows
  • Endpoint
  • On-Premise
Data Sources
  • Process
ATT&CK Techniques
  • T1018
Created: 2022-01-01