title: Suspicious AdFind Execution id: 75df3b17-8bcc-4565-b89b-c9898acef911 status: experimental description: Detects the execution of a AdFind for Active Directory enumeration references: - https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx - https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/master/fin6/Emulation_Plan/Phase1.md author: FPT.EagleEye Team date: 2020/09/26 tags: - attack.discovery - attack.t1016 - attack.t1018 - attack.t1482 #- attack.t1069.002 #- attack.t1087.002 logsource: product: windows service: process_creation detection: selection: ProcessCommandline|contains: 'objectcategory' Image: - '*\adfind.exe' condition: selection falsepositives: - Administrative activity level: medium