NLTEST.EXE Used for Domain Trust Discovery
Adversaries may use the `nltest.exe` command-line utility to enumerate domain trusts and gain insight into trust relationships to facilitate lateral movement within a Microsoft Windows NT Domain.
The nltest.exe utility is a command-line tool used to manage and troubleshoot Windows NT domains. While legitimate domain administrators may use this utility for information gathering, adversaries can also abuse it to enumerate domain trusts and gain insight into trust relationships, which exposes the state of Domain Controller (DC) replication within a Windows NT Domain. This activity is more suspicious in environments with Windows Server 2012 and newer, where its usage is less common for legitimate purposes. Attackers can leverage this information to facilitate lateral movement and other malicious activities within the network.
Attack Chain
- An attacker gains initial access to a compromised host within the target environment.
- The attacker executes
nltest.exewith specific arguments such as/DOMAIN_TRUSTS,/DCLIST:*,/DCNAME:*,/DSGET*,/LSAQUERYFTI:*,/PARENTDOMAIN, or/BDC_QUERY:*to enumerate domain trusts. - The
nltest.exeutility queries the Active Directory to gather information about domain trusts, domain controllers, and other domain-related information. - The attacker parses the output of
nltest.exeto identify trust relationships, domain controllers, and other relevant information about the domain infrastructure. - The attacker uses the gathered information to map out potential lateral movement paths within the environment.
- The attacker leverages discovered trust relationships to authenticate to other domains or resources.
- The attacker moves laterally to other systems or domains, leveraging the discovered trust relationships and compromised credentials.
- The attacker establishes persistence and continues to perform malicious activities, such as data exfiltration or ransomware deployment.
Impact
Successful enumeration of domain trusts via nltest.exe can provide attackers with valuable information to facilitate lateral movement and escalate privileges within a Windows NT Domain. This can lead to the compromise of sensitive data, disruption of critical services, and ultimately, a complete takeover of the affected environment. While the specific number of victims and sectors targeted are unknown, the impact can be significant for organizations relying on Active Directory for authentication and authorization.
Recommendation
- Monitor process execution for
nltest.exewith command-line arguments indicative of domain trust discovery, using the provided Sigma rule. - Investigate any instances of
nltest.exeexecution, especially when initiated by non-administrative users or from unusual locations, as identified by the Sigma rule. - Enable Sysmon process creation logging to capture the necessary process execution data for the provided Sigma rule.
- Review and restrict the use of
nltest.exeto authorized personnel only.
Detection coverage 2
Detect NLTEST.EXE for Domain Trust Discovery
lowDetects the execution of nltest.exe with arguments used to enumerate domain trusts.
Detect Suspicious NLTEST.EXE Usage
lowDetects suspicious usage of nltest.exe with uncommon arguments for domain information gathering.
Detection queries are kept inside the platform. Get full rules →