Probable AdFind Recon Tool Usage

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Identifies the host and account that executed AdFind by hash and filename in addition to common and unique flags that are used by many threat actors in discovery.

Attribute Value
Type Hunting Query
Solution MicrosoftDefenderForEndpoint
ID c63ae777-d5e0-4113-8c9a-c2c9d3d09fcd
Severity High
Tactics Discovery
Techniques T1018
Required Connectors MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
DeviceProcessEvents ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to MicrosoftDefenderForEndpoint