Suspicious Active Directory Database Snapshot Via ADExplorer

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the execution of Sysinternals ADExplorer with the "-snapshot" flag in order to save a local copy of the active directory database to a suspicious directory. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (PROCESSNAME endswith "\ADExp.exe,\ADExplorer.exe,\ADExplorer64.exe,\ADExplorer64a.exe" OR ORIGINALFILENAME = "AdExp" OR MESSAGE = "Active Directory Editor" OR PRODUCT_NAME = "Sysinternals ADExplorer") AND COMMANDLINE contains "snapshot" AND COMMANDLINE contains "\Downloads\,\Users\Public\,\AppData\,\Windows\Temp" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Active Directory

Author

Nasreddine Bencherchali (Nextron Systems)