heroui logo

Suspicious Get Local Groups Information

Sigma Rules

View Source
Summary
The rule is designed to detect suspicious attempts by adversaries to gather information about local system groups using PowerShell commands, specifically 'Get-LocalGroup' and 'Get-LocalGroupMember'. This behavior is indicative of reconnaissance activities where an attacker seeks to discover existing local groups and the users assigned to them. Such information can help attackers identify users with elevated permissions, particularly those in the local administrators group, which is critical when planning further attacks or privilege escalation. The detection logic utilizes various tests to identify the presence of specific PowerShell command patterns in the Payload or ContextInfo of the executed scripts. The attempts must meet specified conditions to trigger an alert, thereby enabling proactive monitoring of potential threats within Windows environments.
Categories
  • Windows
  • Endpoint
Data Sources
  • Script
  • Process
ATT&CK Techniques
  • T1069.001
Created: 2021-12-12