
Summary
This detection rule is designed to identify unauthorized access attempts to the Active Directory's ntds.dit database, which is critical for storing information related to domain users, groups, and credentials. Adversaries may attempt to access this database to extract sensitive credential data or perform reconnaissance on domain members. The detection logic focuses on processes interacting with ntds.dit from unexpected locations that are typically associated with legitimate applications or temporary data. By monitoring these interactions via Sysmon events, the rule effectively highlights potential malicious behavior. However, due to the limitations of EDR logging, it only tracks the processes and their paths but does not analyze parent processes directly. The rule also references multiple known threat actor groups, such as Mustang Panda and UTA0178, which are recognized for targeting Active Directory environments.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Sensor Health
ATT&CK Techniques
- T1003.003
Created: 2024-02-09