Possible SPN enumeration

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Identity Analytics

Detector Tags

LDAP Analytics (Client), LDAP Analytics (Server)

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Account Discovery (T1087)

Severity

Informational

Description

A possible SPN enumeration via LDAP was performed. Such enumeration may be used during attacks against the organization.

Attacker's Goals

An attacker is attempting to enumerate Active Directory.

Investigative actions

  • Check if the process executes LDAP search queries as part of its normal behavior.
  • Investigate the LDAP search query for any suspicious indicators.
  • Determine whether the search query is generic. Wide search queries (often using wildcards) tend to be more suspicious. In our case, we are looking for targeted search queries.

Variations

Suspicious SPN enumeration via LDAP

Synopsis

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Account Discovery (T1087)

Severity

Low

Description

A possible SPN enumeration via LDAP was performed. Such enumeration may be used during attacks against the organization.

Attacker's Goals

An attacker is attempting to enumerate Active Directory.

Investigative actions

  • Check if the process executes LDAP search queries as part of its normal behavior.
  • Investigate the LDAP search query for any suspicious indicators.
  • Determine whether the search query is generic. Wide search queries (often using wildcards) tend to be more suspicious. In our case, we are looking for targeted search queries.