From 6a39f549341c1cd65840497f2ac50793a04bb719 Mon Sep 17 00:00:00 2001 From: Ming Di Leom <2809763-curben@users.noreply.gitlab.com> Date: Sun, 1 Jun 2025 12:02:01 +0000 Subject: [PATCH] page(threat-hunting): Account Discovery Using DIR, WHOAMI, and NET --- source/threat-hunting/index.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/source/threat-hunting/index.md b/source/threat-hunting/index.md index edb66f1..0f12986 100644 --- a/source/threat-hunting/index.md +++ b/source/threat-hunting/index.md @@ -182,6 +182,16 @@ index="aws" sourcetype="aws:cloudtrail" eventSource="sts.amazonaws.com" eventNam | table Time, region, requestParameters.roleArn, sourceIPAddress, userAgent, userIdentity.invokedBy, userIdentity.type ``` +## Account Discovery Using DIR, WHOAMI, and NET + +References: [1](https://thedfirreport.com/2025/05/19/another-confluence-bites-the-dust-falling-to-elpaco-team-ransomware/#discovery) +SPL: + +```spl +| tstats summariesonly=true allow_old_summaries=true count FROM datamodel=Endpoint.Processes WHERE index="windows" Processes.signature_id=4688 Processes.process_name="cmd.exe" Processes.process IN ("*whoami*", "*dir C:\\Users*", "*net localgroup administrators*") BY index, host, Processes.signature_id, Processes.signature, Processes.process, Processes.user, _time span=1s +| rename Processes.* AS *, signature_id AS EventCode, signature AS EventDescription +``` + ## Account Lockout in Administrator Groups Description: Monitor Administrator, *_admin accounts for lockout.