
Summary
The analytic rule detects the execution of the `Get-WmiObject` PowerShell cmdlet specifically targeting the `DS_Group` parameter, utilizing PowerShell Script Block Logging (EventCode=4104). This command is often employed to query domain groups via WMI, which poses a risk as cyber adversaries may leverage it for Active Directory enumeration. By tracking this behavior, organizations can better understand their domain structure and identify potentially malicious activity aimed at privilege escalation or further exploitation of their network infrastructure. Confirmation of malicious activity surrounding this command can signify an attacker mapping out the domain, thereby increasing the risk of unauthorized access within the network.
Categories
- Endpoint
Data Sources
- Pod
ATT&CK Techniques
- T1069
- T1069.002
- T1059.001
Created: 2024-11-13