<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>FIN6 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/fin6/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/fin6/feed.xml" rel="self" type="application/rss+xml"/><item><title>AdFind Tool Used for Active Directory Reconnaissance</title><link>https://feed.craftedsignal.io/briefs/2024-01-adfind-reconnaissance/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adfind-reconnaissance/</guid><description>The execution of AdFind.exe, an Active Directory query tool, is often used by threat actors for post-exploitation Active Directory reconnaissance, as observed in campaigns involving Trickbot, Ryuk, Maze, and FIN6.</description><content:encoded><![CDATA[<p>AdFind is a command-line tool used to retrieve information from Active Directory. While it has legitimate uses for network administrators, threat actors frequently leverage it for post-exploitation Active Directory reconnaissance. The tool allows for quick scoping of AD person/computer objects and understanding subnets and domain information. AdFind has been observed in campaigns associated with various threat actors, including Trickbot, Ryuk, Maze, and FIN6. This reconnaissance activity is typically conducted after initial compromise to gather information for lateral movement and privilege escalation. The detection of AdFind execution, especially with specific command-line arguments, can indicate malicious activity within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows host, possibly through exploitation of a vulnerability or compromised credentials.</li>
<li>Tool Transfer: The attacker transfers AdFind.exe to the compromised host.</li>
<li>Execution: The attacker executes AdFind.exe from the command line or via a script.</li>
<li>Discovery: AdFind is used to enumerate Active Directory objects such as computers (<code>objectcategory=computer</code>), users (<code>objectcategory=person</code>), subnets (<code>objectcategory=subnet</code>), and groups (<code>objectcategory=group</code>).</li>
<li>Information Gathering: The attacker gathers information about domain controllers using commands such as <code>dclist</code> or <code>dcmodes</code>.</li>
<li>Privilege Escalation: The gathered information is used to identify potential targets for privilege escalation, such as accounts with weak passwords or misconfigured permissions.</li>
<li>Lateral Movement: The attacker uses the gathered information to move laterally to other systems within the network.</li>
<li>Objective Completion: The attacker achieves their final objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful reconnaissance using AdFind can provide attackers with a comprehensive understanding of the Active Directory environment, facilitating lateral movement, privilege escalation, and ultimately, the exfiltration of sensitive data or deployment of ransomware. While the use of AdFind itself may not be directly damaging, it is a strong indicator of malicious activity within a compromised network. The impact can range from data breaches and financial losses to reputational damage and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AdFind Command Activity&rdquo; to your SIEM to detect the execution of AdFind with suspicious command-line arguments.</li>
<li>Enable Sysmon process-creation logging to provide the necessary data for the Sigma rule to function effectively (reference the Sysmon setup documentation).</li>
<li>Investigate any alerts generated by the &ldquo;AdFind Command Activity&rdquo; Sigma rule to determine the scope and impact of the potential compromise.</li>
<li>Monitor process execution events for AdFind-related activity, focusing on command-line arguments used to query Active Directory objects (reference the <code>query</code> field in the original rule).</li>
<li>Implement network segmentation to limit the scope of potential lateral movement following a successful compromise.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">threat</category><category>adfind</category><category>active-directory</category><category>reconnaissance</category><category>windows</category></item></channel></rss>