Elevated Group Discovery With Wmic

Elevated Group Discovery With Wmic

Description

This analytic looks for the execution of wmic.exe with command-line arguments utilized to query for specific domain groups. Red Teams and adversaries alike use net.exe to enumerate elevated domain groups for situational awareness and Active Directory Discovery to identify high privileged users.

   Help

Elevated Group Discovery With Wmic Help

To successfully implement this search you need to be ingesting information on process that include the name of the process responsible for the changes from your endpoints into the Endpoint datamodel in the Processes node.

   Search

Open in Search