T1087.002 Suspicious Group And Account Reconnaissance Activity Using Net
T1087.002 - Suspicious Group And Account Reconnaissance Activity Using Net.EXE¶
DESCRIPTION¶
Detects suspicious reconnaissance command line activity on Windows systems using Net.EXE. Check if the user that executed the commands is suspicious (e.g. service accounts, LOCAL_SYSTEM)
Example:
net1 localgroup Administrators
"net.exe" localgroup Administrators
net group "Domain admins" /DOMAIN
Related
LOLBins Discovery
Reference:
https://github.com/SigmaHQ/sigma/blob/49adcf9a00247ed6c3daacba03b589470f6716d0/rules/windows/process_creation/proc_creation_win_net_groups_and_accounts_recon.yml
https://learn.microsoft.com/en-us/windows/win32/winsock/net-exe-2
ATT&CK TACTICS¶
T1087.002 - Account Discovery: Domain Account
Data Source(s): Command, Process
SENTINEL RULE QUERY¶
Triage¶
- Remove the comment "//" in 'summarize' statement in above KQL to assist in analysis and removing data duplicates.
- Inspect if the activity was expected and approved
FalsePositive¶
- Inventory tool runs
- Administrative activity
VERSION¶
Version 1.0 (date: 20/03/2024)