Probable AdFind Recon Tool Usage

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query identifies the host and account that executed AdFind, by hash and filename, in addition to the flags commonly utilized by various threat actors during the reconnaissance phase.

Attribute Value
Type Analytic Rule
Solution Attacker Tools Threat Protection Essentials
ID c63ae777-d5e0-4113-8c9a-c2c9d3d09fcd
Severity High
Status Available
Kind Scheduled
Tactics Discovery
Techniques T1016, T1018, T1069.002, T1087.002, T1482
Required Connectors MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
DeviceProcessEvents ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Attacker Tools Threat Protection Essentials