Renamed AdFind Execution

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the use of a renamed Adfind.exe. AdFind continues to be seen across majority of breaches. It is used to domain trust discovery to plan out subsequent steps in the attack chain.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (COMMANDLINE contains "domainlist,trustdmp,dcmodes,adinfo, dclist ,computer_pwdnotreqd,objectcategory=,-subnets -f,name="Domain Admins",-sc u:,domainncs,dompol, oudmp ,subnetdmp,gpodmp,fspdmp,users_noexpire,computers_active,computers_pwdnotreqd" OR HASHES contains "IMPHASH=BCA5675746D13A1F246E2DA3C2217492,IMPHASH=53E117A96057EAF19C41380D0E87F1C2,IMPHASH=d144de8117df2beceaba2201ad304764,IMPHASH=12ce1c0f3f5837ecc18a3782408fa975,IMPHASH=4fbf3f084fbbb2470b80b2013134df35,IMPHASH=49b639b4acbecc49d72a01f357aa4930,IMPHASH=680dad9e300346e05a85023965867201,IMPHASH=21aa085d54992511b9f115355e468782" OR ORIGINALFILENAME = "AdFind.exe") AND PROCESSNAME notendswith "\AdFind.exe" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Active Directory

Author

Florian Roth (Nextron Systems)