ID | Name |
---|---|
T1069.001 | Local Groups |
T1069.002 | Domain Groups |
T1069.003 | Cloud Groups |
Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as domain administrators.
Commands such as net group /domain
of the Net utility, dscacheutil -q group
on macOS, and ldapsearch
on Linux can list domain-level groups.
ID | Name | Description |
---|---|---|
S0552 | AdFind | |
S0521 | BloodHound |
BloodHound can collect information about domain groups and members.[4] |
S0154 | Cobalt Strike |
Cobalt Strike can identify targets by querying account groups on a domain contoller.[5] |
S0488 | CrackMapExec |
CrackMapExec can gather the user accounts within domain groups.[6] |
G0074 | Dragonfly 2.0 |
Dragonfly 2.0 used batch scripts to enumerate administrators and users in the domain.[7] |
S0105 | dsquery |
dsquery can be used to gather information on permission groups within a domain.[8] |
S0554 | Egregor |
Egregor can conduct Active Directory reconnaissance using tools such as Sharphound or AdFind.[9] |
S0417 | GRIFFON |
GRIFFON has used a reconnaissance module that can be used to retrieve Windows domain membership information.[10] |
S0170 | Helminth |
Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands |
G0100 | Inception |
Inception has used specific malware modules to gather domain membership.[12] |
G0004 | Ke3chang |
Ke3chang performs discovery of permission groups |
S0236 | Kwampirs |
Kwampirs collects a list of domain groups with the command |
S0039 | Net |
Commands such as |
G0049 | OilRig |
OilRig has used |
S0165 | OSInfo |
OSInfo specifically looks for Domain Admins and power users within the domain.[17] |
S0184 | POWRUNER |
POWRUNER may collect domain group information by running |
S0496 | REvil |
REvil can identify the domain membership of a compromised host.[19][20][21] |
S0516 | SoreFang |
SoreFang can enumerate domain groups by executing |
G0010 | Turla |
Turla has used |
S0514 | WellMess |
WellMess can identify domain group membership for the current user.[24] |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
ID | Data Source | Data Component |
---|---|---|
DS0017 | Command | Command Execution |
DS0009 | Process | Process Creation |
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.