| ID | Name |
|---|---|
| T1069.001 | Local Groups |
| T1069.002 | Domain Groups |
| T1069.003 | Cloud Groups |
Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as domain administrators.
Commands such asnet group /domain of theNet utility,dscacheutil -q group on macOS, andldapsearch on Linux can list domain-level groups.
| ID | Name | Description |
|---|---|---|
| S0552 | AdFind | |
| S1081 | BADHATCH | BADHATCH can use |
| S1068 | BlackCat | BlackCat can determine if a user on a compromised host has domain admin privileges.[6] |
| S0521 | BloodHound | BloodHound can collect information about domain groups and members.[7] |
| S1063 | Brute Ratel C4 | Brute Ratel C4 can use |
| C0015 | C0015 | DuringC0015, the threat actors use the command |
| S0154 | Cobalt Strike | Cobalt Strike can identify targets by querying account groups on a domain contoller.[10] |
| S0488 | CrackMapExec | CrackMapExec can gather the user accounts within domain groups.[11] |
| G0035 | Dragonfly | Dragonfly has used batch scripts to enumerate administrators and users in the domain.[12] |
| S0105 | dsquery | dsquery can be used to gather information on permission groups within a domain.[13][14] |
| S0554 | Egregor | Egregor can conduct Active Directory reconnaissance using tools such as Sharphound orAdFind.[15] |
| G0046 | FIN7 | FIN7 has used the command |
| S1138 | Gootloader | Gootloader can determine if a targeted system is part of an Active Directory domain by expanding the %USERDNSDOMAIN% environment variable.[18] |
| S0417 | GRIFFON | GRIFFON has used a reconnaissance module that can be used to retrieve Windows domain membership information.[19] |
| S0170 | Helminth | Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands |
| G1032 | INC Ransom | INC Ransom has enumerated domain groups on targeted hosts.[21] |
| G0100 | Inception | Inception has used specific malware modules to gather domain membership.[22] |
| G0004 | Ke3chang | Ke3chang performs discovery of permission groups |
| S0236 | Kwampirs | Kwampirs collects a list of domain groups with the command |
| G1004 | LAPSUS$ | LAPSUS$ has used the AD Explorer tool to enumerate groups on a victim's network.[25] |
| S1160 | Latrodectus | Latrodectus can identify domain groups through |
| G1051 | Medusa Group | Medusa Group has utilized the |
| G0129 | Mustang Panda | Mustang Panda has leveragedAdFind to enumerate domain groups.[29] |
| S0039 | Net | Commands such as |
| G0049 | OilRig | OilRig has used |
| S0165 | OSInfo | OSInfo specifically looks for Domain Admins and power users within the domain.[32] |
| S0184 | POWRUNER | POWRUNER may collect domain group information by running |
| S0496 | REvil | REvil can identify the domain membership of a compromised host.[34][35][36] |
| G1015 | Scattered Spider | Scattered Spider has enumerated Active Directory security groups including through the use of ADExplorer, ADRecon.ps1, and Get-ADUser.[37][38] |
| S0692 | SILENTTRINITY | SILENTTRINITY can use |
| C0024 | SolarWinds Compromise | During theSolarWinds Compromise,APT29 usedAdFind to enumerate domain groups.[40] |
| S0516 | SoreFang | SoreFang can enumerate domain groups by executing |
| G1022 | ToddyCat | ToddyCat has executed |
| G0010 | Turla | Turla has used |
| G1017 | Volt Typhoon | Volt Typhoon has run |
| S0514 | WellMess | WellMess can identify domain group membership for the current user.[45] |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0360 | Behavioral Detection of Domain Group Discovery | AN1025 | Detection of domain group enumeration through command-line utilities such as 'net group /domain' or PowerShell cmdlets, followed by suspicious access to API calls or LSASS memory. |
| AN1026 | Behavioral detection of domain group enumeration via ldapsearch or custom scripts leveraging LDAP over the network. | ||
| AN1027 | Enumeration of domain groups using dscacheutil or dscl commands, often following initial login or domain trust queries. |