EXPLORE
← Back to Explore
T1069.002

Domain Groups

Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as domain administrators. Commands such as <code>net group /domain</code> of the [Net](https://attack.mitre.org/software/S0039) utility, <code>dscacheutil -q group</code> on macOS, an...

LinuxmacOSWindows
42
Detections
3
Sources
13
Threat Actors

BY SOURCE

21splunk_escu14sigma7elastic

PROCEDURES (26)

Process Creation Monitoring4 detections

Auto-extracted: 4 detections for process creation monitoring

General Monitoring4 detections

Auto-extracted: 4 detections for general monitoring

Script Block4 detections

Auto-extracted: 4 detections for script block

Lateral3 detections

Auto-extracted: 3 detections for lateral

Wmi3 detections

Auto-extracted: 3 detections for wmi

Spray2 detections

Auto-extracted: 2 detections for spray

Privilege2 detections

Auto-extracted: 2 detections for privilege

Powershell2 detections

Auto-extracted: 2 detections for powershell

Powershell1 detections

Auto-extracted: 1 detections for powershell

Wmi1 detections

Auto-extracted: 1 detections for wmi

Powershell1 detections

Auto-extracted: 1 detections for powershell

Persist1 detections

Auto-extracted: 1 detections for persist

Service Monitoring1 detections

Auto-extracted: 1 detections for service monitoring

Service1 detections

Auto-extracted: 1 detections for service

Service1 detections

Auto-extracted: 1 detections for service

Privilege1 detections

Auto-extracted: 1 detections for privilege

Lateral1 detections

Auto-extracted: 1 detections for lateral

Persist1 detections

Auto-extracted: 1 detections for persist

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Spray1 detections

Auto-extracted: 1 detections for spray

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

File Monitoring1 detections

Auto-extracted: 1 detections for file monitoring

Azure1 detections

Auto-extracted: 1 detections for azure

Azure1 detections

Auto-extracted: 1 detections for azure

Lateral1 detections

Auto-extracted: 1 detections for lateral

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

DETECTIONS (42)

Active Directory Database Snapshot Via ADExplorer
sigmamedium
Active Directory Discovery using AdExplorer
elasticlow
Active Directory Group Enumeration With Get-AdGroup
sigmalow
ADExplorer Writing Complete AD Snapshot Into .dat File
sigmamedium
AdFind Command Activity
elasticlow
BloodHound Collection Files
sigmahigh
Detect AzureHound Command-Line Arguments
splunk_escu
Detect AzureHound File Modifications
splunk_escu
Detect SharpHound Command-Line Arguments
splunk_escu
Detect SharpHound File Modifications
splunk_escu
Detect SharpHound Usage
splunk_escu
Domain Group Discovery with Adsisearcher
splunk_escu
Domain Group Discovery With Dsquery
splunk_escu
Domain Group Discovery With Wmic
splunk_escu
Elevated Group Discovery with PowerView
splunk_escu
Elevated Group Discovery With Wmic
splunk_escu
Enumeration of Administrator Accounts
elasticlow
Enumeration of Users or Groups via Built-in Commands
elasticlow
GetAdGroup with PowerShell
splunk_escu
GetAdGroup with PowerShell Script Block
splunk_escu
GetDomainGroup with PowerShell
splunk_escu
GetDomainGroup with PowerShell Script Block
splunk_escu
GetWmiObject Ds Group with PowerShell
splunk_escu
GetWmiObject Ds Group with PowerShell Script Block
splunk_escu
HackTool - Bloodhound/Sharphound Execution
sigmahigh
HackTool - SharpView Execution
sigmahigh
Malicious PowerShell Commandlets - PoshModule
sigmahigh
Malicious PowerShell Commandlets - ProcessCreation
sigmahigh
Malicious PowerShell Commandlets - ScriptBlock
sigmahigh
Network Traffic to Active Directory Web Services Protocol
splunk_escu
Potential Active Directory Reconnaissance/Enumeration Via LDAP
sigmamedium
Potential Enumeration via Active Directory Web Service
elasticmedium
PowerShell Suspicious Discovery Related Windows API Functions
elasticlow
PUA - AdFind Suspicious Execution
sigmahigh
Reconnaissance Activity
sigmahigh
Renamed AdFind Execution
sigmahigh
Suspicious Access to LDAP Attributes
elasticlow
Suspicious Active Directory Database Snapshot Via ADExplorer
sigmahigh
Windows Group Discovery Via Net
splunk_escu
Windows Ldifde Directory Object Behavior
splunk_escu
Windows Sensitive Group Discovery With Net
splunk_escu
Windows SOAPHound Binary Execution
splunk_escu