Files
blue-team-tools/rules/windows/builtin/security/win_lolbas_execution_of_nltest.yml
T
2022-03-16 14:57:06 +01:00

31 lines
1.0 KiB
YAML

title: Correct Execution of Nltest.exe
id: eeb66bbb-3dde-4582-815a-584aee9fe6d1
status: experimental
author: Arun Chauhan
date: 2021/10/04
description: The attacker might use LOLBAS nltest.exe for discovery of domain controllers, domain trusts, parent domain and the current user permissions.
references:
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/nltest.htm
- https://attack.mitre.org/software/S0359/
tags:
- attack.discovery
- attack.t1482 # enumerate trusted domains by using commands such as nltest /domain_trusts
- attack.t1018 # enumerate remote domain controllers using options such as /dclist and /dsgetdc
- attack.t1016 # enumerate the parent domain of a local machine using /parentdomain
logsource:
product: windows
service: security
detection:
selection:
EventID: 4689
ProcessName|endswith: nltest.exe
Status: '0x0'
condition: selection
fields:
- 'SubjectUserName'
- 'SubjectDomainName'
falsepositives:
- Red team activity
- Rare legitimate use by an administrator
level: high