heroui logo

Domain Account Discovery With Net App

Splunk Security Content

View Source
Summary
The 'Domain Account Discovery With Net App' detection rule, now deprecated in favor of a generic version, focuses on identifying the invocation of the 'net.exe' or 'net1.exe' command-line tools. These tools are often used by attackers to enumerate domain users in Windows environments, a practice that can indicate attempts to discover Active Directory resources or to gather information for additional attacks like lateral movement. The analytic utilizes multiple data sources, particularly logs from Endpoint Detection and Response (EDR) solutions, such as Sysmon Event ID 1 and Windows Event Log Security 4688, to track processes associated with these commands. If executed with user enumeration parameters, it signifies potential malicious intent. The rule is primarily aimed at security analysts monitoring for unauthorized access attempts within Active Directory.
Categories
  • Windows
  • Endpoint
  • Infrastructure
  • Identity Management
Data Sources
  • Windows Registry
  • Process
  • File
ATT&CK Techniques
  • T1087
  • T1087.002
Created: 2025-01-13