
Summary
This rule is designed to detect the execution of the AdFind.exe utility, which is often associated with information gathering in Active Directory environments. AdFind.exe is a command-line tool used by IT administrators to query Active Directory objects and obtain information such as user accounts, groups, and domain structures. However, it can also be maliciously exploited by attackers to conduct reconnaissance, making it important for detection in secure environments. The detection relies on specific characteristics of the execution process, including the image name and specific hash values known to correspond to instances of AdFind.exe. The detection logic checks for any instances where the process name ends with '\AdFind.exe', confirms if the original filename matches 'AdFind.exe', or if the process hash matches any of a predefined set of IMPHASH values known to be associated with legitimate copies of this utility. This rule should be monitored to identify potential misuse and ensure that it is only used for legitimate administrative purposes.
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1087.002
Created: 2025-02-26