<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windows NT Domain — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/windows-nt-domain/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 11 Jan 2024 17:49:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/windows-nt-domain/feed.xml" rel="self" type="application/rss+xml"/><item><title>NLTEST.EXE Used for Domain Trust Discovery</title><link>https://feed.craftedsignal.io/briefs/2024-01-nltest-domain-trust-discovery/</link><pubDate>Thu, 11 Jan 2024 17:49:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nltest-domain-trust-discovery/</guid><description>Adversaries may use the `nltest.exe` command-line utility to enumerate domain trusts and gain insight into trust relationships to facilitate lateral movement within a Microsoft Windows NT Domain.</description><content:encoded><![CDATA[<p>The <code>nltest.exe</code> utility is a command-line tool used to manage and troubleshoot Windows NT domains. While legitimate domain administrators may use this utility for information gathering, adversaries can also abuse it to enumerate domain trusts and gain insight into trust relationships, which exposes the state of Domain Controller (DC) replication within a Windows NT Domain. This activity is more suspicious in environments with Windows Server 2012 and newer, where its usage is less common for legitimate purposes. Attackers can leverage this information to facilitate lateral movement and other malicious activities within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target environment.</li>
<li>The attacker executes <code>nltest.exe</code> with specific arguments such as <code>/DOMAIN_TRUSTS</code>, <code>/DCLIST:*</code>, <code>/DCNAME:*</code>, <code>/DSGET*</code>, <code>/LSAQUERYFTI:*</code>, <code>/PARENTDOMAIN</code>, or <code>/BDC_QUERY:*</code> to enumerate domain trusts.</li>
<li>The <code>nltest.exe</code> utility queries the Active Directory to gather information about domain trusts, domain controllers, and other domain-related information.</li>
<li>The attacker parses the output of <code>nltest.exe</code> to identify trust relationships, domain controllers, and other relevant information about the domain infrastructure.</li>
<li>The attacker uses the gathered information to map out potential lateral movement paths within the environment.</li>
<li>The attacker leverages discovered trust relationships to authenticate to other domains or resources.</li>
<li>The attacker moves laterally to other systems or domains, leveraging the discovered trust relationships and compromised credentials.</li>
<li>The attacker establishes persistence and continues to perform malicious activities, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of domain trusts via <code>nltest.exe</code> can provide attackers with valuable information to facilitate lateral movement and escalate privileges within a Windows NT Domain. This can lead to the compromise of sensitive data, disruption of critical services, and ultimately, a complete takeover of the affected environment. While the specific number of victims and sectors targeted are unknown, the impact can be significant for organizations relying on Active Directory for authentication and authorization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for <code>nltest.exe</code> with command-line arguments indicative of domain trust discovery, using the provided Sigma rule.</li>
<li>Investigate any instances of <code>nltest.exe</code> execution, especially when initiated by non-administrative users or from unusual locations, as identified by the Sigma rule.</li>
<li>Enable Sysmon process creation logging to capture the necessary process execution data for the provided Sigma rule.</li>
<li>Review and restrict the use of <code>nltest.exe</code> to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>domain trust</category><category>lateral movement</category><category>windows</category></item></channel></rss>