title: Suspicious AdFind Execution author: FPT.EagleEye Team, omkar72, oscd.community date: 2020/09/26 description: Detects the execution of a AdFind for Active Directory enumeration detection: SELECTION_1: EventID: 1 SELECTION_2: CommandLine: - '*objectcategory*' - '*trustdmp*' - '*dcmodes*' - '*dclist*' - '*computers_pwdnotreqd*' SELECTION_3: Image: '*\adfind.exe' condition: (SELECTION_1 and SELECTION_2 and SELECTION_3) falsepositives: - Administrative activity id: 75df3b17-8bcc-4565-b89b-c9898acef911 level: medium logsource: category: process_creation product: windows modified: 2021/05/12 references: - https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx - https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/master/fin6/Emulation_Plan/Phase1.md - https://thedfirreport.com/2020/05/08/adfind-recon/ status: experimental tags: - attack.discovery - attack.t1018 - attack.t1087.002 - attack.t1482 - attack.t1069.002 ruletype: SIGMA