Possible LDAP Enumeration Tool Usage

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Identity Analytics

Detector Tags

LDAP Analytics (Client), LDAP Analytics (Server)

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Severity

Informational

Description

A user sent a suspicious enumeration query via LDAP. The query is associated with an LDAP enumeration tool that may be used during attacks against the organization.

Attacker's Goals

An attacker is attempting to enumerate Active Directory.

Investigative actions

  • Check if the process executes LDAP search queries as part of its normal behavior.
  • Investigate the LDAP search query for any suspicious indicators.
  • Determine whether the search query is generic. Wide search queries (often using wildcards) tend to be more suspicious. In our case, we are looking for targeted search queries.

Variations

Possible admin enumeration via LDAP

Synopsis

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Severity

Informational

Description

A user sent a suspicious enumeration query via LDAP. The query is associated with an LDAP enumeration tool that may be used during attacks against the organization.

Attacker's Goals

An attacker is attempting to enumerate Active Directory.

Investigative actions

  • Check if the process executes LDAP search queries as part of its normal behavior.
  • Investigate the LDAP search query for any suspicious indicators.
  • Determine whether the search query is generic. Wide search queries (often using wildcards) tend to be more suspicious. In our case, we are looking for targeted search queries.


A user executed an LDAP enumeration query with suspicious characteristics

Synopsis

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Severity

Medium

Description

A user sent a suspicious enumeration query via LDAP. The query is associated with an LDAP enumeration tool that may be used during attacks against the organization.

Attacker's Goals

An attacker is attempting to enumerate Active Directory.

Investigative actions

  • Check if the process executes LDAP search queries as part of its normal behavior.
  • Investigate the LDAP search query for any suspicious indicators.
  • Determine whether the search query is generic. Wide search queries (often using wildcards) tend to be more suspicious. In our case, we are looking for targeted search queries.


Rare LDAP enumeration query executed by a user

Synopsis

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Severity

Low

Description

A user sent a suspicious enumeration query via LDAP. The query is associated with an LDAP enumeration tool that may be used during attacks against the organization.

Attacker's Goals

An attacker is attempting to enumerate Active Directory.

Investigative actions

  • Check if the process executes LDAP search queries as part of its normal behavior.
  • Investigate the LDAP search query for any suspicious indicators.
  • Determine whether the search query is generic. Wide search queries (often using wildcards) tend to be more suspicious. In our case, we are looking for targeted search queries.