<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Adws — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/adws/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 31 Jan 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/adws/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Enumeration via Active Directory Web Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-adws-enumeration/</link><pubDate>Wed, 31 Jan 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adws-enumeration/</guid><description>Adversaries may abuse the Active Directory Web Service (ADWS) to enumerate network resources and user accounts, by loading AD-related modules followed by a network connection to the ADWS dedicated TCP port.</description><content:encoded><![CDATA[<p>The Active Directory Web Service (ADWS) facilitates querying Active Directory (AD) over a network, providing a web-based interface for directory services. Adversaries may exploit ADWS to enumerate network resources and user accounts, gaining insights into the environment. This attack involves loading Active Directory related modules and establishing network connections to the ADWS dedicated TCP port 9389. The goal is to gather information about the domain, user accounts, and permissions, which can be used for lateral movement, privilege escalation, and data exfiltration. Detection focuses on identifying suspicious processes loading <code>System.DirectoryServices*.dll</code> or <code>System.IdentityModel*.dll</code> and then connecting to the ADWS port.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target network.</li>
<li>The attacker executes a reconnaissance tool or script (e.g., PowerShell) on the compromised host.</li>
<li>The reconnaissance tool loads Active Directory related modules such as <code>System.DirectoryServices*.dll</code> and <code>System.IdentityModel*.dll</code>.</li>
<li>The reconnaissance tool attempts to establish a network connection to the ADWS service on TCP port 9389, the dedicated port for ADWS.</li>
<li>The tool queries ADWS to retrieve information about domain users (T1087.002), groups (T1069.002), systems (T1018), and permissions.</li>
<li>The attacker analyzes the gathered information to identify privileged accounts and potential targets for lateral movement.</li>
<li>The attacker uses the discovered information to move laterally within the network.</li>
<li>The attacker escalates privileges, and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain detailed knowledge of the Active Directory environment. This information can be used to identify high-value targets, compromise privileged accounts, move laterally within the network, and ultimately achieve their objectives, which could include data theft, ransomware deployment, or disruption of services. The impact can range from data breaches to complete compromise of the Active Directory domain, depending on the attacker&rsquo;s goals and the level of access they achieve.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential ADWS Enumeration via Suspicious Library Loading&rdquo; to detect processes loading AD-related DLLs (e.g., <code>System.DirectoryServices*.dll</code>, <code>System.IdentityModel*.dll</code>).</li>
<li>Deploy the Sigma rule &ldquo;Potential ADWS Enumeration via Network Connection&rdquo; to monitor for network connections to destination port 9389 from unusual processes.</li>
<li>Review and whitelist legitimate administrative tools or scripts that load Active Directory-related modules and connect to the ADWS port as described in the &ldquo;False positive analysis&rdquo; section of the original rule documentation.</li>
<li>Implement network segmentation to limit access to the ADWS port (9389) to only trusted systems and users.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>active-directory</category><category>enumeration</category><category>adws</category><category>discovery</category><category>windows</category></item></channel></rss>