
Summary
The rule "Elevated Group Discovery With Wmic" detects instances where the Windows Management Instrumentation Command-line (WMIC) is utilized to enumerate elevated domain groups in Active Directory. This detection leverages telemetry from Endpoint Detection and Response (EDR) platforms to monitor processes accessing the LDAP namespace directly. The rule specifically looks for command line arguments indicative of queries to high-privilege groups such as 'Domain Admins' or 'Enterprise Admins'. Identifying attempts to access these groups is critical, as it is often a precursor to malicious activities, including reconnaissance and potential privilege escalation by adversaries intending to compromise high-level accounts. The rule utilizes events from Sysmon and Windows Event Logs to accurately track such processes. Implementation requires proper setup of EDR agents and ingestion of relevant logs mapped to the Splunk data model.
Categories
- Endpoint
Data Sources
- Windows Registry
- Logon Session
- Process
ATT&CK Techniques
- T1069
- T1069.002
Created: 2024-11-13