NTDS.DIT Creation By Uncommon Process

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon process or a process located in a suspicious directory

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "File Created or Modified" AND (FILENAME endswith "\ntds.dit" OR OBJECTNAME endswith "\ntds.dit") AND (PROCESSNAME endswith "\cmd.exe,\cscript.exe,\mshta.exe,\powershell.exe,\pwsh.exe,\regsvr32.exe,\rundll32.exe,\wscript.exe,\wsl.exe,\wt.exe" OR PROCESSNAME contains "\AppData\,\Temp\,\Public\,\PerfLogs") select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.OBJECTNAME,Action1.FILENAME,Action1.PROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Active Directory

Author

Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)