heroui logo

NTDS.DIT Creation By Uncommon Process

Sigma Rules

View Source
Summary
This detection rule identifies the creation of the 'ntds.dit' file, which serves as the Active Directory (AD) database, initiated by uncommon or suspicious processes. The 'ntds.dit' file is critical as it contains user credential hashes, making it a prime target for attackers aiming to perform credential theft. The rule works by monitoring Windows file events and checking for processes that create this database file, particularly if these processes are not typical for this action (e.g., cmd.exe or PowerShell) or are executed from unusual directories like AppData, Temp, Public, or PerfLogs. Given that the unauthorized creation of 'ntds.dit' could signify an attacker's attempt to extract sensitive user information, this rule provides a high level of confidence and is essential for maintaining the integrity of Active Directory security.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2022-01-11