heroui logo

ADExplorer Snapshot Creation

Anvilogic Forge

View Source
Summary
The rule titled 'ADExplorer Snapshot Creation' is designed to detect potentially malicious use of the AD Explorer tool from Sysinternals, specifically regarding its capability to create snapshots of the Active Directory (AD) database. AD Explorer allows users to analyze AD objects and structures, which could be exploited by threat actors to gain insights into user accounts, security settings, and potential vectors for privilege escalation or lateral movement within a target environment. The detection logic is implemented in Splunk, leveraging data from Windows Sysmon events. It searches for the execution of AD Explorer with the snapshot command, indicating a possible unauthorized activity. This detection focuses on findings related to the Event Code for process creation (EventCode=1) and filters for instances where AD Explorer is executed with a snapshot command. The rule highlights concerns over credential access techniques, specifically OS credential dumping and the handling of unsecured credentials, with corresponding MITRE technique IDs T1552.001 and T1003.003.
Categories
  • Windows
  • Infrastructure
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1552.001
  • T1003.003
Created: 2024-02-09