heroui logo

Enumeration of Administrator Accounts

Elastic Detection Rules

View Source
Summary
The 'Enumeration of Administrator Accounts' detection rule identifies instances where lower privilege user accounts execute built-in Windows tools to enumerate administrator accounts or groups. This is a common reconnaissance step taken by attackers after compromising an environment, as they seek to gain situational awareness and identify targets for credential compromise. The rule focuses on monitoring the execution of 'net.exe' and 'wmic.exe' commands with specific arguments that indicate attempts to list administrator users or groups. Anomalous usage of these commands could signal a prelude to further malicious activities, such as potential credential harvesting. The rule stipulates investigation steps, including examining the process execution chain, identifying account behaviors, and conducting response measures like credential resets and malware scans if harmful activities are confirmed.
Categories
  • Windows
  • Endpoint
  • Network
Data Sources
  • Process
  • Application Log
  • Windows Registry
ATT&CK Techniques
  • T1069
  • T1069.001
  • T1069.002
  • T1087
  • T1087.001
  • T1087.002
Created: 2020-12-04