Skip to content

Commit dacd82d

Browse files
Branch was auto-updated.
2 parents 1edd30b + ec9e45c commit dacd82d

4 files changed

+233
-0
lines changed
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
name: Windows Find Domain Organizational Units with GetDomainOU
2+
id: 0ada2f82-b7af-40cc-b1d7-1e5985afcb4e
3+
version: 1
4+
date: '2023-08-31'
5+
author: Gowthamaraj Rajendran, Mauricio Velazco, Splunk
6+
status: production
7+
type: TTP
8+
data_source:
9+
- Powershell 4104
10+
description: This analytic leverages PowerShell Script Block Logging (EventCode=4104) to detect the execution of the `Get-DomainOU` commandlet. `Get-DomainOU` is a component of PowerView, a PowerShell toolkit designed for Windows domain enumeration. Identifying the use of `Get-DomainOU` is crucial as adversaries and Red Teams might employ it to gain insights into organizational units within Active Directory, potentially aiding in lateral movement or privilege escalation strategies.
11+
search: '`powershell` EventCode=4104 ScriptBlockText = "*Get-DomainOU*"
12+
| stats count min(_time) as firstTime max(_time) as lastTime by EventCode ScriptBlockText Computer UserID | rename Computer as dest, UserID as user
13+
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
14+
| `windows_find_domain_organizational_units_with_getdomainou_filter`'
15+
how_to_implement: The following Hunting analytic requires PowerShell operational logs to be imported. Modify the powershell macro as needed to match the sourcetype or add index. This analytic is specific to 4104, or PowerShell Script Block Logging.
16+
known_false_positives: Administrators may leverage PowerSploit tools for legitimate reasons, filter as needed.
17+
references:
18+
- https://powersploit.readthedocs.io/en/latest/Recon/Get-DomainOU/
19+
- https://attack.mitre.org/techniques/T1087/002/
20+
- https://book.hacktricks.xyz/windows-hardening/basic-powershell-for-pentesters/powerview
21+
tags:
22+
analytic_story:
23+
- Active Directory Discovery
24+
asset_type: Endpoint
25+
confidence: 50
26+
impact: 50
27+
message: Suspicious PowerShell Get-DomainOU was identified on endpoint $dest$
28+
by user $user$.
29+
mitre_attack_id:
30+
- T1087
31+
- T1087.002
32+
observable:
33+
- name: dest
34+
type: Hostname
35+
role:
36+
- Victim
37+
- name: user
38+
type: User
39+
role:
40+
- Victim
41+
product:
42+
- Splunk Enterprise
43+
- Splunk Enterprise Security
44+
- Splunk Cloud
45+
required_fields:
46+
- _time
47+
- EventCode
48+
- Message
49+
- Computer
50+
- UserID
51+
risk_score: 25
52+
security_domain: endpoint
53+
tests:
54+
- name: True Positive Test
55+
attack_data:
56+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1087.002/AD_discovery/windows-powershell-DomainOU-xml.log
57+
source: XmlWinEventLog:Microsoft-Windows-PowerShell/Operational
58+
sourcetype: xmlwineventlog
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
name: Windows Find Interesting ACL with FindInterestingDomainAcl
2+
id: e4a96dfd-667a-4487-b942-ccef5a1e81e8
3+
version: 1
4+
date: '2023-08-31'
5+
author: Gowthamaraj Rajendran, Mauricio Velazco, Splunk
6+
status: production
7+
type: TTP
8+
data_source:
9+
- Powershell 4104
10+
description: This analytic leverages PowerShell Script Block Logging (EventCode=4104) to detect the execution of the `Find-InterestingDomainAcl` commandlet. `Find-InterestingDomainAcl` is part of PowerView, a PowerShell toolkit designed for Windows domain enumeration. Detecting the use of `Find-InterestingDomainAcl` is crucial as adversaries and Red Teams might employ it to identify unusual or misconfigured Access Control Lists (ACLs) within the domain. Such ACLs can provide attackers with insights into potential privilege escalation opportunities or weak security postures within Active Directory.
11+
search: '`powershell` EventCode=4104 ScriptBlockText = "*Find-InterestingDomainAcl*"
12+
| stats count min(_time) as firstTime max(_time) as lastTime by EventCode ScriptBlockText Computer UserID | rename Computer as dest, UserID as user
13+
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
14+
| `windows_find_interesting_acl_with_findinterestingdomainacl_filter`'
15+
how_to_implement: The following Hunting analytic requires PowerShell operational logs to be imported. Modify the powershell macro as needed to match the sourcetype or add index. This analytic is specific to 4104, or PowerShell Script Block Logging.
16+
known_false_positives: Administrators may leverage PowerSploit tools for legitimate reasons, filter as needed.
17+
references:
18+
- https://powersploit.readthedocs.io/en/latest/Recon/Find-InterestingDomainAcl/
19+
- https://attack.mitre.org/techniques/T1087/002/
20+
- https://book.hacktricks.xyz/windows-hardening/basic-powershell-for-pentesters/powerview
21+
tags:
22+
analytic_story:
23+
- Active Directory Discovery
24+
asset_type: Endpoint
25+
confidence: 50
26+
impact: 50
27+
message: Suspicious PowerShell Find-InterestingDomainAcl was identified on endpoint $dest$ by user $user$.
28+
mitre_attack_id:
29+
- T1087
30+
- T1087.002
31+
observable:
32+
- name: dest
33+
type: Hostname
34+
role:
35+
- Victim
36+
- name: user
37+
type: User
38+
role:
39+
- Victim
40+
product:
41+
- Splunk Enterprise
42+
- Splunk Enterprise Security
43+
- Splunk Cloud
44+
required_fields:
45+
- _time
46+
- EventCode
47+
- Message
48+
- Computer
49+
- UserID
50+
risk_score: 25
51+
security_domain: endpoint
52+
tests:
53+
- name: True Positive Test
54+
attack_data:
55+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1087.002/AD_discovery/windows-powershell-interestingACL-xml.log
56+
source: XmlWinEventLog:Microsoft-Windows-PowerShell/Operational
57+
sourcetype: xmlwineventlog
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
name: Windows Forest Discovery with GetForestDomain
2+
id: a14803b2-4bd9-4c08-8b57-c37980edebe8
3+
version: 1
4+
date: '2023-08-31'
5+
author: Gowthamaraj Rajendran, Mauricio Velazco, Splunk
6+
status: production
7+
type: TTP
8+
data_source:
9+
- Powershell 4104
10+
description: This analytic utilizes PowerShell Script Block Logging (EventCode=4104) to detect the execution of the `Get-ForestDomain` commandlet. `Get-ForestDomain` is a component of PowerView, a PowerShell toolkit designed for Windows domain enumeration. Detecting the use of `Get-ForestDomain` is essential as adversaries and Red Teams might employ it to gain insights into the forest and domain configurations of an Active Directory environment. Such information can provide attackers with a broader understanding of the domain structure and potential avenues for lateral movement or privilege escalation.
11+
search: '`powershell` EventCode=4104 ScriptBlockText = "*Get-ForestDomain*"
12+
| stats count min(_time) as firstTime max(_time) as lastTime by EventCode ScriptBlockText Computer UserID | rename Computer as dest, UserID as user
13+
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
14+
| `windows_forest_discovery_with_getforestdomain_filter`'
15+
how_to_implement: The following Hunting analytic requires PowerShell operational logs to be imported. Modify the powershell macro as needed to match the sourcetype or add index. This analytic is specific to 4104, or PowerShell Script Block Logging.
16+
known_false_positives: Administrators may leverage PowerSploit tools for legitimate reasons, filter as needed.
17+
references:
18+
- https://powersploit.readthedocs.io/en/latest/Recon/Get-ForestDomain/
19+
- https://attack.mitre.org/techniques/T1087/002/
20+
- https://book.hacktricks.xyz/windows-hardening/basic-powershell-for-pentesters/powerview
21+
tags:
22+
analytic_story:
23+
- Active Directory Discovery
24+
asset_type: Endpoint
25+
confidence: 50
26+
impact: 50
27+
message: Suspicious PowerShell Get-ForestDomain was identified on endpoint $dest$ by user $user$.
28+
mitre_attack_id:
29+
- T1087
30+
- T1087.002
31+
observable:
32+
- name: dest
33+
type: Hostname
34+
role:
35+
- Victim
36+
- name: user
37+
type: User
38+
role:
39+
- Victim
40+
product:
41+
- Splunk Enterprise
42+
- Splunk Enterprise Security
43+
- Splunk Cloud
44+
required_fields:
45+
- _time
46+
- EventCode
47+
- Message
48+
- Computer
49+
- UserID
50+
risk_score: 25
51+
security_domain: endpoint
52+
tests:
53+
- name: True Positive Test
54+
attack_data:
55+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1087.002/AD_discovery/windows-powershell-ForestDomain-xml.log
56+
source: XmlWinEventLog:Microsoft-Windows-PowerShell/Operational
57+
sourcetype: xmlwineventlog
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
name: Windows Get Local Admin with FindLocalAdminAccess
2+
id: d2988160-3ce9-4310-b59d-905334920cdd
3+
version: 1
4+
date: '2023-08-31'
5+
author: Gowthamaraj Rajendran, Mauricio Velazco, Splunk
6+
status: production
7+
type: TTP
8+
data_source:
9+
- Powershell 4104
10+
description: This analytic leverages PowerShell Script Block Logging (EventCode=4104) to detect the execution of the `Find-LocalAdminAccess` commandlet. `Find-LocalAdminAccess` is part of PowerView, a PowerShell toolkit designed for Windows domain enumeration. Detecting the use of `Find-LocalAdminAccess` is vital as adversaries and Red Teams might employ it to identify machines where the current user context has local administrator access. Such information can provide attackers with potential targets for lateral movement or privilege escalation within the network.
11+
search: '`powershell` EventCode=4104 ScriptBlockText = "*Find-LocalAdminAccess*"
12+
| stats count min(_time) as firstTime max(_time) as lastTime by EventCode ScriptBlockText Computer UserID | rename Computer as dest, UserID as user
13+
| `security_content_ctime(firstTime)`
14+
| `security_content_ctime(lastTime)`
15+
| `windows_get_local_admin_with_findlocaladminaccess_filter`'
16+
how_to_implement: The following Hunting analytic requires PowerShell operational logs
17+
to be imported. Modify the powershell macro as needed to match the sourcetype or
18+
add index. This analytic is specific to 4104, or PowerShell Script Block Logging.
19+
known_false_positives: Administrators may leverage PowerSploit tools for legitimate reasons, filter as needed.
20+
references:
21+
- https://powersploit.readthedocs.io/en/latest/Recon/Find-LocalAdminAccess/
22+
- https://attack.mitre.org/techniques/T1087/002/
23+
- https://book.hacktricks.xyz/windows-hardening/basic-powershell-for-pentesters/powerview
24+
tags:
25+
analytic_story:
26+
- Active Directory Discovery
27+
asset_type: Endpoint
28+
confidence: 50
29+
impact: 50
30+
message: Suspicious PowerShell Find-LocalAdminAccess was identified on endpoint $dest$
31+
by user $user$.
32+
mitre_attack_id:
33+
- T1087
34+
- T1087.002
35+
observable:
36+
- name: dest
37+
type: Hostname
38+
role:
39+
- Victim
40+
- name: user
41+
type: User
42+
role:
43+
- Victim
44+
product:
45+
- Splunk Enterprise
46+
- Splunk Enterprise Security
47+
- Splunk Cloud
48+
required_fields:
49+
- _time
50+
- EventCode
51+
- Message
52+
- Computer
53+
- UserID
54+
risk_score: 25
55+
security_domain: endpoint
56+
tests:
57+
- name: True Positive Test
58+
attack_data:
59+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1087.002/AD_discovery/windows-powershell-LocalAdminAccess-xml.log
60+
source: XmlWinEventLog:Microsoft-Windows-PowerShell/Operational
61+
sourcetype: xmlwineventlog

0 commit comments

Comments
 (0)