Possible LDAP enumeration by unsigned process

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2024-09-24
Category
Analytics Alert Reference
Order
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

10 Minutes

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Detector Tags

LDAP Analytics (Client)

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Account Discovery (T1087)

Severity

Informational

Description

An unsigned process performed multiple different LDAP search queries.
This may be indicative of LDAP enumeration.

Attacker's Goals

An attacker is attempting to enumerate Active Directory.

Investigative actions

  • Check if the process executes LDAP search queries as part of its normal behavior.
  • Investigate the LDAP search query for any suspicious indicators.
  • Determine whether the search query is generic. Generic search queries (often using wildcards) tend to be more suspicious.

Variations

Possible LDAP enumeration by unsigned process

Synopsis

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Account Discovery (T1087)

Severity

Medium

Description

An unsigned process performed multiple different LDAP search queries.
This may be indicative of LDAP enumeration.

Attacker's Goals

An attacker is attempting to enumerate Active Directory.

Investigative actions

  • Check if the process executes LDAP search queries as part of its normal behavior.
  • Investigate the LDAP search query for any suspicious indicators.
  • Determine whether the search query is generic. Generic search queries (often using wildcards) tend to be more suspicious.


Possible LDAP enumeration by unsigned process

Synopsis

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Account Discovery (T1087)

Severity

Low

Description

An unsigned process performed multiple different LDAP search queries.
This may be indicative of LDAP enumeration.

Attacker's Goals

An attacker is attempting to enumerate Active Directory.

Investigative actions

  • Check if the process executes LDAP search queries as part of its normal behavior.
  • Investigate the LDAP search query for any suspicious indicators.
  • Determine whether the search query is generic. Generic search queries (often using wildcards) tend to be more suspicious.