
Summary
The detection rule focuses on identifying the use of the 'nltest' command on Windows systems, specifically with options 'dclist' or 'dsgetdc'. These options are employed by adversaries to enumerate domain controllers in a network. By leveraging the 'nltest' utility, attackers can extract critical information about network configurations, including IP addresses and hostnames of systems that may facilitate lateral movement within a compromised environment. This behavior falls under two primary techniques: system network configuration discovery (T1016) and remote system discovery (T1018). The rule utilizes Splunk to capture process creation events (EventCode 4688) and filter for executions of 'nltest' with the specified options, highlighting interactions that could indicate malicious reconnaissance activities.
Categories
- Windows
- Network
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1016
- T1018
Created: 2024-02-09