Techniques
Sample rules
Elevated Group Discovery with PowerView
- source: splunk
- technicques:
- T1069
- T1069.002
Description
The following analytic utilizes PowerShell Script Block Logging (EventCode=4104) to identify the execution of the Get-DomainGroupMember
commandlet. Get-DomainGroupMember
is part of PowerView, a PowerShell tool used to perform enumeration on Windows domains. As the name suggests, Get-DomainGroupMember
is used to list the members of an specific domain group. Red Teams and adversaries alike use PowerView to enumerate elevated domain groups for situational awareness and Active Directory Discovery to identify high privileged users.
Detection logic
`powershell` EventCode=4104 (Message = "*Get-DomainGroupMember*") AND Message IN ("*Domain Admins*","*Enterprise Admins*", "*Schema Admins*", "*Account Operators*" , "*Server Operators*", "*Protected Users*", "*Dns Admins*")
| stats count min(_time) as firstTime max(_time) as lastTime by EventCode Message ComputerName User
| rename ComputerName as dest, User as user
| `security_content_ctime(firstTime)`
| `elevated_group_discovery_with_powerview_filter`