heroui logo

GetDomainGroup with PowerShell

Splunk Security Content

View Source
Summary
The 'GetDomainGroup with PowerShell' detection rule identifies the execution of PowerShell commands that query for domain groups using the 'Get-DomainGroup' cmdlet. This command is part of PowerView, a tool commonly utilized by attackers for domain enumeration and reconnaissance, allowing them to gather information on domain group structures. The rule leverages data from Endpoint Detection and Response (EDR) agents and focuses on analyzing process names and command-line arguments related to 'powershell.exe'. By monitoring this activity, organizations can proactively detect and respond to potential domain enumeration attempts that could facilitate further exploitation or privilege escalation by adversaries. Implementation requires configuring the ingestion of logs related to process executions and their command line arguments, using Splunk's Endpoint data model for consistency and ease of analysis.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Active Directory
ATT&CK Techniques
  • T1069
  • T1069.002
Created: 2024-11-13