ID | Name |
---|---|
T1069.001 | Local Groups |
T1069.002 | Domain Groups |
T1069.003 | Cloud Groups |
Adversaries may attempt to find local system groups and permission settings. The knowledge of local system permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as the users found within the local administrators group.
Commands such as net localgroup
of the Net utility, dscl . -list /Groups
on macOS, and groups
on Linux can list local groups.
ID | Name | Description |
---|---|---|
G0018 | admin@338 |
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to list local groups: |
S0521 | BloodHound |
BloodHound can collect information about local groups and members.[2] |
C0015 | C0015 |
During C0015, the threat actors used the command |
S0572 | Caterpillar WebShell |
Caterpillar WebShell can obtain a list of local groups of users from a system.[4] |
G0114 | Chimera |
Chimera has used |
S0154 | Cobalt Strike |
Cobalt Strike can use |
S0082 | Emissary |
Emissary has the capability to execute the command |
S0091 | Epic | |
S0696 | Flagpro |
Flagpro has been used to execute the |
S0381 | FlawedAmmyy |
FlawedAmmyy enumerates the privilege level of the victim during the initial infection.[10][11] |
S0170 | Helminth | |
G1001 | HEXANE |
HEXANE has run |
S0201 | JPIN | |
S0265 | Kazuar |
Kazuar gathers information about local groups and members.[15] |
S0236 | Kwampirs |
Kwampirs collects a list of users belonging to the local users and administrators groups with the commands |
S1141 | LunarWeb | |
S0039 | Net |
Commands such as |
G0049 | OilRig |
OilRig has used |
C0012 | Operation CuckooBees |
During Operation CuckooBees, the threat actors used the |
C0014 | Operation Wocao |
During Operation Wocao, threat actors used the command |
S0165 | OSInfo | |
S0378 | PoshC2 |
PoshC2 contains modules, such as |
S0184 | POWRUNER |
POWRUNER may collect local group information by running |
S0650 | QakBot |
QakBot can use |
S0692 | SILENTTRINITY |
SILENTTRINITY can obtain a list of local groups and members.[27] |
S0060 | Sys10 |
Sys10 collects the group name of the logged-in user and sends it to the C2.[28] |
G0131 | Tonto Team |
Tonto Team has used the |
G0010 | Turla |
Turla has used |
G1017 | Volt Typhoon |
Volt Typhoon has run |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor for executed commands and arguments that may attempt to find local system groups and permission settings. |
DS0036 | Group | Group Enumeration |
Monitor for logging that may suggest a list of available groups and/or their associated settings has been extracted, ex. Windows EID 4798 and 4799. |
DS0009 | Process | OS API Execution |
Monitor for API calls associated with finding local system groups and permission settings, such as NetLocalGroupEnum. Other API calls relevant to Local Group discovery include NetQueryDisplayInformation and NetGetDisplayInformationIndex. Note: Most EDR tools do not support direct monitoring of API calls due to the sheer volume of calls produced by an endpoint but may have alerts or events that are based on abstractions of OS API calls. Dynamic malware analysis tools (i.e., sandboxes) can be used to trace the execution, including OS API calls, for a single PE binary. |
Process Creation |
Monitor newly executed processes that may attempt to find local system groups and permission settings. Note: Event IDs are for Sysmon (Event ID 1 - process creation) and Windows Security Log (Event ID 4688 - a new process has been created). The logic in the Analytic looks for any instances of net.exe used for local user/group discovery; although this utility is not normally used for benign purposes, such usage by system administrator actions may trigger false positives. Analytic 1 - Local Permission Group Discovery
|