heroui logo

Suspicious Active Directory Database Snapshot Via ADExplorer

Sigma Rules

View Source
Summary
This detection rule focuses on identifying potentially malicious activities related to the use of Sysinternals ADExplorer, a tool often utilized for Active Directory exploration. The rule specifically targets instances where ADExplorer is executed with the '-snapshot' command-line argument, indicating an attempt to create a local snapshot of the Active Directory database. This is particularly concerning when such snapshots are saved to suspicious directories, such as common temporary folders or user profile downloads, where attackers might attempt to hide their tracks or gather sensitive data. The rule captures process creation events and checks the command line arguments to filter relevant executions, thereby helping organizations detect unauthorized access or manipulation of the Active Directory environment.
Categories
  • Endpoint
  • Windows
  • Identity Management
Data Sources
  • Process
Created: 2023-03-14