heroui logo

Windows Account Discovery for Sam Account Name

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect instances of Windows account discovery, specifically through the use of the PowerView PowerShell cmdlet 'Get-NetUser'. It focuses on activity querying for the attributes 'samaccountname' and 'pwdlastset', which are often indicative of reconnaissance efforts by attackers. This behavior is monitored using Event ID 4104 from PowerShell Script Block Logging, which captures details about the execution of PowerShell scripts. The presence of these queries could suggest that an attacker is attempting to enumerate user accounts in an Active Directory environment, a common precursor to lateral movement or privilege escalation attacks. If determined to be a malicious act, it could ultimately facilitate unauthorized access to network resources. The detection logic utilizes specific pattern matching within the PowerShell script blocks to identify this potentially harmful behavior, allowing security teams to respond swiftly to such activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Persona
ATT&CK Techniques
  • T1087
Created: 2024-11-13