WBadmin NTDS Dump

Last updated on:

Rule name

Rule type

Log sources

MITRE ATT&CK tags

Severity

WBadmin NTDS Dump

Standard

Sysmon, Windows

Credential Access: OS Credential Dumping (T1003.003)

Critical

About the rule

Rule Type

Standard

Rule Description

Identifies the execution of wbadmin.exe to access the NTDS.dit file in a domain controller. Attackers with privileges from groups like Backup Operators can abuse the utility to perform credential access and compromise the domain by extracting the Active Directory database.

Why this rule?

This command extracts the Active Directory database (NTDS.dit), which contains all domain credentials including password hashes. Successful execution gives attackers the keys to your entire domain, enabling complete network compromise. Detecting NTDS extraction attempts is critical for preventing domain-wide credential theft.

Severity

Critical

Rule journey

Attack chain scenario

Privilege Escalation → Credential Access → Execution of WBadmin → Recovery of NTDS.dit → Offline password cracking and Domain Admin compromise.

Impact

Total domain compromise. If the NTDS.dit file is exfiltrated, adversaries can crack the hashes of all domain users, including administrative accounts.

Rule Requirement

Prerequisites

Enable Process Creation auditing (Event ID 4688) with Command Line details enabled on Domain Controllers.

Criteria

Action1: actionname = "Process started" AND ((PROCESSNAME endswith "wbadmin.exe" OR ORIGINALFILENAME = "wbadmin.exe") AND (COMMANDLINE contains "recovery" AND COMMANDLINE contains "ntds.dit")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME,Action1.DOMAIN,Action1.ORIGINALFILENAME,Action1.PARENTPROCESSID,Action1.PROCESSID,Action1.PRODUCT_NAME,Action1.SECURITYID

Detection

Execution Mode

realtime

Log Sources

Active Directory

MITRE ATT&CK

Credential Access: OS Credential Dumping (T1003.003)

Author

@Nasreddine Bencherchali (Nextron Systems), frack113

Future actions

Known False Positives

Legitimate backup recovery operations conducted by authorized domain administrators during a disaster recovery exercise or system maintenance.

Next Steps

  1. Identification: Identify the user account and host that initiated the command.
  2. Analysis: Determine if the recovery of NTDS.dit was authorized and documented in a change ticket.
  3. Response: If unauthorized, isolate the Domain Controller and initiate a domain-wide password reset for high-privilege accounts.

Mitigation

ID

Mitigation

Description

M1041

Encrypt Sensitive Information

Ensure Domain Controller backups are properly secured.[2]

M1027

Password Policies

Ensure that local administrator accounts have complex, unique passwords across all systems on the network.

M1026

Privileged Account Management

Do not put user or admin domain accounts in the local administrator groups across systems unless they are tightly controlled, as this is often equivalent to having a local administrator account with the same password on all systems. Follow best practices for design and administration of an enterprise network to limit privileged account use across administrative tiers.

M1017

User Training

Limit credential overlap across accounts and systems by training users and administrators not to use the same password for multiple accounts.