Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
- Requires:
- XDR Agent with eXtended Threat Hunting (XTH)
|
Detection Modules |
Identity Analytics |
Detector Tags |
LDAP Analytics (Client), LDAP Analytics (Server) |
ATT&CK Tactic |
Discovery (TA0007) |
ATT&CK Technique |
|
Severity |
Informational |
Description
A user sent a suspicious enumeration query via LDAP. The query is associated with an LDAP enumeration tool that may be used during attacks against the organization.
Attacker's Goals
An attacker is attempting to enumerate Active Directory.
Investigative actions
- Check if the process executes LDAP search queries as part of its normal behavior.
- Investigate the LDAP search query for any suspicious indicators.
- Determine whether the search query is generic. Wide search queries (often using wildcards) tend to be more suspicious. In our case, we are looking for targeted search queries.
Variations
Possible admin enumeration via LDAP
Synopsis
Description
A user sent a suspicious enumeration query via LDAP. The query is associated with an LDAP enumeration tool that may be used during attacks against the organization.
Attacker's Goals
An attacker is attempting to enumerate Active Directory.
Investigative actions
- Check if the process executes LDAP search queries as part of its normal behavior.
- Investigate the LDAP search query for any suspicious indicators.
- Determine whether the search query is generic. Wide search queries (often using wildcards) tend to be more suspicious. In our case, we are looking for targeted search queries.
A user executed an LDAP enumeration query with suspicious characteristics
Synopsis
Description
A user sent a suspicious enumeration query via LDAP. The query is associated with an LDAP enumeration tool that may be used during attacks against the organization.
Attacker's Goals
An attacker is attempting to enumerate Active Directory.
Investigative actions
- Check if the process executes LDAP search queries as part of its normal behavior.
- Investigate the LDAP search query for any suspicious indicators.
- Determine whether the search query is generic. Wide search queries (often using wildcards) tend to be more suspicious. In our case, we are looking for targeted search queries.
Rare LDAP enumeration query executed by a user
Synopsis
Description
A user sent a suspicious enumeration query via LDAP. The query is associated with an LDAP enumeration tool that may be used during attacks against the organization.
Attacker's Goals
An attacker is attempting to enumerate Active Directory.
Investigative actions
- Check if the process executes LDAP search queries as part of its normal behavior.
- Investigate the LDAP search query for any suspicious indicators.
- Determine whether the search query is generic. Wide search queries (often using wildcards) tend to be more suspicious. In our case, we are looking for targeted search queries.