heroui logo

AD Groups Or Users Enumeration Using PowerShell - PoshModule

Sigma Rules

View Source
Summary
The detection rule focuses on identifying malicious activity where adversaries use PowerShell commands to enumerate Active Directory (AD) groups or users. By executing commands like `get-ADPrincipalGroupMembership` and `get-aduser`, attackers can gather information about group memberships and user details, allowing them to identify those with elevated permissions, particularly domain administrators. This behavior indicates a reconnaissance phase in an attack cycle where adversaries aim to exploit privileged accounts. The conditions for triggering this alert include the presence of specific command outputs within the payload or context information uploaded to the system. Therefore, the rule serves as a vigilance indicator for unusual queries that can lead to privilege escalation.
Categories
  • Windows
  • Identity Management
Data Sources
  • Windows Registry
  • Process
  • Command
  • User Account
ATT&CK Techniques
  • T1069.002
Created: 2021-12-15