
Summary
The analytic for detecting the execution of `adfind.exe` is crucial for identifying potentially malicious activities related to Active Directory (AD) exploitation. `adfind.exe`, often utilized by threat actors such as Wizard Spider and FIN6, is a command-line tool that can extract sensitive information from Active Directory. This detection rule analyzes command-line arguments and parent processes of `adfind.exe` executions by leveraging data from EDR tools like Sysmon and Windows Event Logs. The search criterion focuses on specific flags associated with AD queries which, if executed without valid administrative context, may indicate preparatory actions for privilege escalation or lateral movement in a compromised network environment. False positives can arise from legitimate administrative activities, necessitating the use of filters to differentiate between benign and malicious usage. This detection and its implementation play a vital role in strengthening an organization's security posture against targeted attacks leveraging AD enumeration capabilities.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Application Log
ATT&CK Techniques
- T1018
Created: 2024-11-13