AdFind Recon
A threat actor logged into the RDP honeypot from 217[.]182[.]242[.]13 (OVH) with a hostname of WORK9F3B. Within 20 seconds they opened a command prompt and issued the following commands
They then logged off and 15 minutes later logged back in from a hostname of MacBook-Pro (the resolution was a lot better compared to whatever they were using before 🙂 ). From there they ran whoami /upn and then dropped AdFind.
AdFind is described as the following:
Command line Active Directory query tool. Mixture of ldapsearch, search.vbs, ldp, dsquery, and dsget tools with a ton of other cool features thrown in for good measure. This tool proceeded dsquery/dsget/etc by years though I did adopt some of the useful stuff from those tools.
http://www.joeware.net/freetools/tools/adfind/
The threat actor then ran a batch file which ran AdFind commands and output them to txt files.
- objectcategory=person – Finds all person objects
- objectcategory=computer – Finds all computers in domain
- trustdmp – Dumps trust objects.
- objectcategory=subnet – Finds all subnets
- domainlist – Dumps all Domain NCs in forest in sorted DNS list format
- dcmodes – Shows modes of all DCs in forest from config
- adinfo – Shows Active Directory Info with whoami info.
- dclist – Dumps Domain Controllers FQDNs.
- computers_pwdnotreqd – Dumps users set with password not required.
AdFind usage can be found here.
The threat actors then added a local admin user named Adm.1c with a password of adm99!@. The actors were not seen again.
We’ve seen AdFind used numerous times for recon in the past and continue to see it today. Here are a few more examples of AdFind being used for recon:
- FireEye recently published an article on Maze ransomware TTPs which included the use of AdFind and a script to run and output files. Read more here.
- Cybereason put out an article last year on a Trickbot infection which used AdFind. Read more here.
- FireEye put out an article in April of 2019 which talked about a FIN6 intrusion which used AdFind. Read more here.
- Visa put out a Situational Intelligence Report on FIN6 activities in 2019 which included the use of AdFind. Read more here.
If you know of other instances where AdFind has been used for recon leading up to ransomware or other malicious activities please contact us so we can add it to the list.
Enjoy our report? Please consider donating $1 or more to the project using Patreon. Thank you for your support!