Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Techniques
  3. Enterprise
  4. Permission Groups Discovery
  5. Domain Groups

Permission Groups Discovery: Domain Groups

Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as domain administrators.

Commands such asnet group /domain of theNet utility,dscacheutil -q group on macOS, andldapsearch on Linux can list domain-level groups.

ID: T1069.002
Sub-technique of: T1069
Tactic:Discovery
Platforms: Linux, Windows, macOS
Contributors: Harshal Tupsamudre, Qualys; Miriam Wiesner, @miriamxyra, Microsoft Security
Version: 1.2
Created: 21 February 2020
Last Modified: 24 October 2025

Procedure Examples

IDNameDescription
S0552 AdFind

AdFind can enumerate domain groups.[1][2][3][4]

S1081 BADHATCH

BADHATCH can usenet.exe group "domain admins" /domain to identify Domain Administrators.[5]

S1068 BlackCat

BlackCat can determine if a user on a compromised host has domain admin privileges.[6]

S0521 BloodHound

BloodHound can collect information about domain groups and members.[7]

S1063 Brute Ratel C4

Brute Ratel C4 can usenet group for discovery on targeted domains.[8]

C0015 C0015

DuringC0015, the threat actors use the commandnet group "domain admins" /dom to enumerate domain groups.[9]

S0154 Cobalt Strike

Cobalt Strike can identify targets by querying account groups on a domain contoller.[10]

S0488 CrackMapExec

CrackMapExec can gather the user accounts within domain groups.[11]

G0035 Dragonfly

Dragonfly has used batch scripts to enumerate administrators and users in the domain.[12]

S0105 dsquery

dsquery can be used to gather information on permission groups within a domain.[13][14]

S0554 Egregor

Egregor can conduct Active Directory reconnaissance using tools such as Sharphound orAdFind.[15]

G0046 FIN7

FIN7 has used the commandnet group "domain admins" /domain to enumerate domain groups.[16][17]  

S1138 Gootloader

Gootloader can determine if a targeted system is part of an Active Directory domain by expanding the %USERDNSDOMAIN% environment variable.[18]

S0417 GRIFFON

GRIFFON has used a reconnaissance module that can be used to retrieve Windows domain membership information.[19]

S0170 Helminth

Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commandsnet group Exchange Trusted Subsystem /domain andnet group domain admins /domain.[20]

G1032 INC Ransom

INC Ransom has enumerated domain groups on targeted hosts.[21]

G0100 Inception

Inception has used specific malware modules to gather domain membership.[22]

G0004 Ke3chang

Ke3chang performs discovery of permission groupsnet group /domain.[23]

S0236 Kwampirs

Kwampirs collects a list of domain groups with the commandnet localgroup /domain.[24]

G1004 LAPSUS$

LAPSUS$ has used the AD Explorer tool to enumerate groups on a victim's network.[25]

S1160 Latrodectus

Latrodectus can identify domain groups throughcmd.exe /c net group "Domain Admins" /domain.[26][27]

G1051 Medusa Group

Medusa Group has utilized thenet group command to query domain groups within the victim environment.[28]

G0129 Mustang Panda

Mustang Panda has leveragedAdFind to enumerate domain groups.[29]

S0039 Net

Commands such asnet group /domain can be used inNet to gather information about and manipulate groups.[30]

G0049 OilRig

OilRig has usednet group /domain,net group "domain admins" /domain, andnet group "Exchange Trusted Subsystem" /domain to find domain group permission settings.[31]

S0165 OSInfo

OSInfo specifically looks for Domain Admins and power users within the domain.[32]

S0184 POWRUNER

POWRUNER may collect domain group information by runningnet group /domain or a series of other commands on a victim.[33]

S0496 REvil

REvil can identify the domain membership of a compromised host.[34][35][36]

G1015 Scattered Spider

Scattered Spider has enumerated Active Directory security groups including through the use of ADExplorer, ADRecon.ps1, and Get-ADUser.[37][38]

S0692 SILENTTRINITY

SILENTTRINITY can useSystem.DirectoryServices namespace to retrieve domain group information.[39]

C0024 SolarWinds Compromise

During theSolarWinds Compromise,APT29 usedAdFind to enumerate domain groups.[40]

S0516 SoreFang

SoreFang can enumerate domain groups by executingnet.exe group /domain.[41]

G1022 ToddyCat

ToddyCat has executednet group "domain admins" /dom for discovery on compromised machines.[42]

G0010 Turla

Turla has usednet group "Domain Admins" /domain to identify domain administrators.[43]

G1017 Volt Typhoon

Volt Typhoon has runnet group in compromised environments to discover domain groups.[44]

S0514 WellMess

WellMess can identify domain group membership for the current user.[45]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

Detection Strategy

IDNameAnalytic IDAnalytic Description
DET0360Behavioral Detection of Domain Group DiscoveryAN1025

Detection of domain group enumeration through command-line utilities such as 'net group /domain' or PowerShell cmdlets, followed by suspicious access to API calls or LSASS memory.

AN1026

Behavioral detection of domain group enumeration via ldapsearch or custom scripts leveraging LDAP over the network.

AN1027

Enumeration of domain groups using dscacheutil or dscl commands, often following initial login or domain trust queries.

References

  1. Brian Donohue, Katie Nickels, Paul Michaud, Adina Bodkins, Taylor Chapman, Tony Lambert, Jeff Felling, Kyle Rainey, Mike Haag, Matt Graeber, Aaron Didier.. (2020, October 29). A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak. Retrieved October 30, 2020.
  2. McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.
  3. Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.
  4. Kamble, V. (2022, June 28). Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem. Retrieved August 24, 2022.
  5. Vrabie, V., et al. (2021, March 10). FIN8 Returns with Improved BADHATCH Toolkit. Retrieved September 8, 2021.
  6. Microsoft Defender Threat Intelligence. (2022, June 13). The many lives of BlackCat ransomware. Retrieved December 20, 2022.
  7. Red Team Labs. (2018, April 24). Hidden Administrative Accounts: BloodHound to the Rescue. Retrieved October 28, 2020.
  8. Kenefick, I. et al. (2022, October 12). Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike. Retrieved February 6, 2023.
  9. DFIR Report. (2021, November 29). CONTInuing the Bazar Ransomware Story. Retrieved September 29, 2022.
  10. Strategic Cyber LLC. (2020, November 5). Cobalt Strike: Advanced Threat Tactics for Penetration Testers. Retrieved April 13, 2021.
  11. byt3bl33d3r. (2018, September 8). SMB: Command Reference. Retrieved July 17, 2020.
  12. US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.
  13. Microsoft. (n.d.). Dsquery. Retrieved April 18, 2016.
  14. Rufus Brown, Van Ta, Douglas Bienstock, Geoff Ackerman, John Wolfram. (2022, March 8). Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments. Retrieved July 8, 2022.
  15. Bichet, J. (2020, November 12). Egregor – Prolock: Fraternal Twins ?. Retrieved January 6, 2021.
  16. Abdo, B., et al. (2022, April 4). FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7. Retrieved April 5, 2022.
  17. The BlackBerry Research and Intelligence Team. (2024, April 17). Threat Group FIN7 Targets the U.S. Automotive Industry. Retrieved May 1, 2025.
  18. Pirozzi, A. (2021, June 16). Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets. Retrieved May 28, 2024.
  19. Namestnikov, Y. and Aime, F. (2019, May 8). FIN7.5: the infamous cybercrime rig “FIN7” continues its activities. Retrieved October 11, 2019.
  20. Unit 42. (2017, December 15). Unit 42 Playbook Viewer. Retrieved December 20, 2017.
  21. Team Huntress. (2023, August 11). Investigating New INC Ransom Group Activity. Retrieved June 5, 2024.
  22. Symantec. (2018, March 14). Inception Framework: Alive and Well, and Hiding Behind Proxies. Retrieved May 8, 2020.
  23. Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014.
  1. Symantec Security Response Attack Investigation Team. (2018, April 23). New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and Asia. Retrieved May 8, 2018.
  2. MSTIC, DART, M365 Defender. (2022, March 24). DEV-0537 Criminal Actor Targeting Organizations for Data Exfiltration and Destruction. Retrieved May 17, 2022.
  3. Batista, J. (2024, June 17). Latrodectus, are you coming back?. Retrieved September 13, 2024.
  4. Stepanic, D. and Bousseaden, S. (2024, May 15). Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID. Retrieved September 13, 2024.
  5. Cybersecurity and Infrastructure Security Agency. (2025, March 12). AA25-071A #StopRansomware: Medusa Ransomware. Retrieved October 15, 2025.
  6. Lior Rochberger, Tom Fakterman, Robert Falcone. (2023, September 22). Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda. Retrieved September 9, 2025.
  7. Savill, J. (1999, March 4). Net.exe reference. Retrieved September 22, 2015.
  8. Falcone, R. and Lee, B.. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved May 3, 2017.
  9. Symantec Security Response. (2016, September 6). Buckeye cyberespionage group shifts gaze from US to Hong Kong. Retrieved September 26, 2016.
  10. Sardiwal, M, et al. (2017, December 7). New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit. Retrieved December 20, 2017.
  11. Mamedov, O, et al. (2019, July 3). Sodin ransomware exploits Windows vulnerability and processor architecture. Retrieved August 4, 2020.
  12. McAfee. (2019, October 2). McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us. Retrieved August 4, 2020.
  13. Counter Threat Unit Research Team. (2019, September 24). REvil/Sodinokibi Ransomware. Retrieved August 4, 2020.
  14. Counter Adversary Operations. (2025, July 2). CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries. Retrieved October 13, 2025.
  15. Mandiant Incident Response. (2025, July 23). From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944. Retrieved October 13, 2025.
  16. Salvati, M. (2019, August 6). SILENTTRINITY Modules. Retrieved March 24, 2022.
  17. CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.
  18. CISA. (2020, July 16). MAR-10296782-1.v1 – SOREFANG. Retrieved September 29, 2020.
  19. Dedola, G. et al. (2023, October 12). ToddyCat: Keep calm and check logs. Retrieved January 3, 2024.
  20. Faou, M. (2020, May). From Agent.btz to ComRAT v4: A ten-year journey. Retrieved June 15, 2020.
  21. Counter Threat Unit Research Team. (2023, May 24). Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations. Retrieved July 27, 2023.
  22. CISA. (2020, July 16). MAR-10296782-2.v1 – WELLMESS. Retrieved September 24, 2020.
×

[8]ページ先頭

©2009-2026 Movatter.jp