
Summary
The SharpHound Enumeration detection rule is designed to identify suspicious activities associated with the use of SharpHound, a tool used for collecting information about Active Directory (AD) environments. This tool can reveal complex attack paths that hostile actors exploit to compromise systems. By executing specific queries against Windows event logs, the rule looks for indicators of SharpHound's operation, which include event IDs related to user and group enumeration activities. The detection logic leverages a combination of event codes and correlates various metrics, such as user group counts and process name occurrences, to highlight unusually high levels of account and permission group discoveries indicative of potential reconnaissance activities. This rule is relevant to known APT actors and their associated malware families, signaling the importance of continuous monitoring of AD environments for malicious enumeration attempts.
Categories
- Windows
- Cloud
- On-Premise
- Identity Management
Data Sources
- Windows Registry
- Active Directory
- Application Log
ATT&CK Techniques
- T1059.001
- T1087.002
- T1069.002
- T1087.001
- T1082
- T1059.003
- T1482
- T1201
- T1069.001
Created: 2024-02-09