NTDS.DIT Creation By Uncommon Process
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon process or a process located in a suspicious directory
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "File Created or Modified" AND (FILENAME endswith "\ntds.dit" OR OBJECTNAME endswith "\ntds.dit") AND (PROCESSNAME endswith "\cmd.exe,\cscript.exe,\mshta.exe,\powershell.exe,\pwsh.exe,\regsvr32.exe,\rundll32.exe,\wscript.exe,\wsl.exe,\wt.exe" OR PROCESSNAME contains "\AppData\,\Temp\,\Public\,\PerfLogs") select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.OBJECTNAME,Action1.FILENAME,Action1.PROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Active Directory
Author
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)


