
Summary
The 'Net Localgroup Discovery' detection rule is a hunting analytic designed to identify the execution of the `net localgroup` command within a network environment. This command is utilized for enumerating local group memberships on a Windows system, which is a critical action that potential attackers might undertake to locate privileged accounts. The rule processes data sourced from various Endpoint Detection and Response (EDR) agents, particularly focusing on logs that capture process executions with command-line details. As attackers often perform reconnaissance to gather such information for achieving privilege escalation or lateral movement within the network, monitoring for this command allows for early detection of possible malicious activities. It has been deprecated in favor of a more generic analytic, indicating a shift in the strategy or method for threat detection in this domain. The implementation details emphasize the need for ingesting specific telemetry logs, alongside modifying normalizations using the Splunk Common Information Model (CIM). It is important to note that false positives can occur, necessitating appropriate tuning for the environment.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1069
- T1069.001
Created: 2025-01-13