mirror of https://gitlab.com/curben/blog
page(threat-hunting): Account Discovery Using DIR, WHOAMI, and NET
This commit is contained in:
parent
429092e81a
commit
6a39f54934
|
|
@ -182,6 +182,16 @@ index="aws" sourcetype="aws:cloudtrail" eventSource="sts.amazonaws.com" eventNam
|
||||||
| table Time, region, requestParameters.roleArn, sourceIPAddress, userAgent, userIdentity.invokedBy, userIdentity.type
|
| table Time, region, requestParameters.roleArn, sourceIPAddress, userAgent, userIdentity.invokedBy, userIdentity.type
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Account Discovery Using DIR, WHOAMI, and NET
|
||||||
|
|
||||||
|
References: [1](https://thedfirreport.com/2025/05/19/another-confluence-bites-the-dust-falling-to-elpaco-team-ransomware/#discovery)
|
||||||
|
SPL:
|
||||||
|
|
||||||
|
```spl
|
||||||
|
| tstats summariesonly=true allow_old_summaries=true count FROM datamodel=Endpoint.Processes WHERE index="windows" Processes.signature_id=4688 Processes.process_name="cmd.exe" Processes.process IN ("*whoami*", "*dir C:\\Users*", "*net localgroup administrators*") BY index, host, Processes.signature_id, Processes.signature, Processes.process, Processes.user, _time span=1s
|
||||||
|
| rename Processes.* AS *, signature_id AS EventCode, signature AS EventDescription
|
||||||
|
```
|
||||||
|
|
||||||
## Account Lockout in Administrator Groups
|
## Account Lockout in Administrator Groups
|
||||||
|
|
||||||
Description: Monitor Administrator, *_admin accounts for lockout.
|
Description: Monitor Administrator, *_admin accounts for lockout.
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue