Detectionhightest

PUA - AdFind Suspicious Execution

Detects AdFind execution with common flags seen used during attacks

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Janantha Marasinghe, FPT.EagleEye Team, omkar72, oscd.communityCreated Tue Feb 02Updated Fri Oct 249a132afa-654e-11eb-ae93-0242ac130002windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic1 selector
detection:
    selection:
        CommandLine|contains:
            - 'domainlist'
            - 'trustdmp'
            - 'dcmodes'
            - 'adinfo'
            - '-sc dclist'
            - 'computer_pwdnotreqd'
            - 'objectcategory='
            - '-subnets -f'
            - 'name="Domain Admins"'
            - '-sc u:'
            - 'domainncs'
            - 'dompol'
            - ' oudmp '
            - 'subnetdmp'
            - 'gpodmp'
            - 'fspdmp'
            - 'users_noexpire'
            - 'computers_active'
            - 'computers_pwdnotreqd'
    condition: selection
False Positives

Legitimate admin activity

Testing & Validation

Simulations

atomic-red-teamT1018
View on ART

Adfind - Enumerate Active Directory Computer Objects

GUID: a889f5be-2d54-4050-bd05-884578748bb4

atomic-red-teamT1018
View on ART

Adfind - Enumerate Active Directory Domain Controller Objects

GUID: 5838c31e-a0e2-4b9f-b60a-d79d2cb7995e

Regression Tests

by SigmaHQ Team
Positive Detection Test1 matchevtx

Microsoft-Windows-Sysmon

Rule Metadata
Rule ID
9a132afa-654e-11eb-ae93-0242ac130002
Status
test
Level
high
Type
Detection
Created
Tue Feb 02
Modified
Fri Oct 24
Path
rules/windows/process_creation/proc_creation_win_pua_adfind_susp_usage.yml
Raw Tags
attack.discoveryattack.t1018attack.t1087.002attack.t1482attack.t1069.002stp.1u
View on GitHub