| ID | Name |
|---|---|
| T1069.001 | Local Groups |
| T1069.002 | Domain Groups |
| T1069.003 | Cloud Groups |
Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as domain administrators.
Commands such as net group /domain of the Net utility, dscacheutil -q group on macOS, and ldapsearch on Linux can list domain-level groups.
| ID | Name | Description |
|---|---|---|
| S0552 | AdFind | |
| G0016 | APT29 | |
| S0521 | BloodHound |
BloodHound can collect information about domain groups and members.[5] |
| S0154 | Cobalt Strike |
Cobalt Strike can identify targets by querying account groups on a domain contoller.[6] |
| S0488 | CrackMapExec |
CrackMapExec can gather the user accounts within domain groups.[7] |
| G0035 | Dragonfly |
Dragonfly has used batch scripts to enumerate administrators and users in the domain.[8] |
| S0105 | dsquery |
dsquery can be used to gather information on permission groups within a domain.[9] |
| S0554 | Egregor |
Egregor can conduct Active Directory reconnaissance using tools such as Sharphound or AdFind.[10] |
| S0417 | GRIFFON |
GRIFFON has used a reconnaissance module that can be used to retrieve Windows domain membership information.[11] |
| S0170 | Helminth |
Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands |
| G0100 | Inception |
Inception has used specific malware modules to gather domain membership.[13] |
| G0004 | Ke3chang |
Ke3chang performs discovery of permission groups |
| S0236 | Kwampirs |
Kwampirs collects a list of domain groups with the command |
| S0039 | Net |
Commands such as |
| G0049 | OilRig |
OilRig has used |
| S0165 | OSInfo |
OSInfo specifically looks for Domain Admins and power users within the domain.[18] |
| S0184 | POWRUNER |
POWRUNER may collect domain group information by running |
| S0496 | REvil |
REvil can identify the domain membership of a compromised host.[20][21][22] |
| S0692 | SILENTTRINITY |
SILENTTRINITY can use |
| S0516 | SoreFang |
SoreFang can enumerate domain groups by executing |
| G0010 | Turla |
Turla has used |
| S0514 | WellMess |
WellMess can identify domain group membership for the current user.[26] |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
| ID | Data Source | Data Component |
|---|---|---|
| DS0017 | Command | Command Execution |
| DS0009 | Process | Process Creation |
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.