Rule Content
- title: Reconnaissance Activity
  id: 968eef52-9cff-4454-8992-1e74b9cbad6c
  status: experimental
  description: Detects activity as "net user administrator /domain" and "net group
    domain admins /domain"
  references:
  - https://findingbad.blogspot.de/2017/01/hunting-what-does-it-look-like.html
  author: Florian Roth (rule), Jack Croock (method)
  tags:
  - attack.discovery
  - attack.t1087
  - attack.t1069
  - attack.s0039
  logsource:
    product: windows
    service: security
    definition: The volume of Event ID 4661 is high on Domain Controllers and therefore
      "Audit SAM" and "Audit Kernel Object" advanced audit policy settings are not
      configured in the recommendations for server systems
    category: null
  detection:
    selection:
    - EventID: 4661
      ObjectType: SAM_USER
      ObjectName: S-1-5-21-*-500
      AccessMask: '0x2d'
    - EventID: 4661
      ObjectType: SAM_GROUP
      ObjectName: S-1-5-21-*-512
      AccessMask: '0x2d'
    condition: selection
  falsepositives:
  - Administrator activity
  - Penetration tests
  level: high