heroui logo

Elevated Group Discovery With Net

Splunk Security Content

View Source
Summary
The deprecated analytic rule detects the use of `net.exe` or `net1.exe` with command-line arguments to query elevated domain groups on Windows systems. It utilizes data from Endpoint Detection and Response (EDR) agents, specifically analyzing process names and command-line executions. The execution of these commands can indicate reconnaissance activities by adversaries aiming to identify high-privileged users in Active Directory. If such activities are confirmed malicious, they could enable potential attacks targeting privileged accounts, privilege escalation, or unauthorized access to sensitive information. While this detection rule has been deprecated, it underscores crucial security considerations regarding privileged access management in enterprise environments.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • User Account
ATT&CK Techniques
  • T1069
  • T1069.002
Created: 2025-01-24