LOLBAS/yml/OtherMSBinaries/Dsdbutil.yml

69 lines
3.0 KiB
YAML
Raw Normal View History

---
2023-05-31 16:52:51 +02:00
Name: dsdbutil.exe
2023-08-23 08:17:56 +02:00
Description: Dsdbutil is a command-line tool that is built into Windows Server. It is available if you have the AD LDS server role installed. Can be used as a command line utility to export Active Directory.
2023-08-22 18:35:43 +02:00
Aliases:
2023-08-23 08:17:56 +02:00
- Alias: dsDbUtil.exe # PE Original filename
2023-05-31 16:52:51 +02:00
Author: Ekitji
2023-08-23 08:17:56 +02:00
Created: 2023-05-31
2023-05-31 16:52:51 +02:00
Commands:
- Command: dsdbutil.exe "activate instance ntds" "snapshot" "create" "quit" "quit"
Description: dsdbutil supports VSS snapshot creation
Usecase: Snapshoting of Active Directory NTDS.dit database
Category: Dump
Privileges: Administrator
2023-06-08 00:07:25 +02:00
MitreID: T1003.003
2023-08-23 08:17:56 +02:00
OperatingSystem: Windows Server 2012, Windows Server 2016, Windows Server 2019
- Command: dsdbutil.exe "activate instance ntds" "snapshot" "mount {GUID}" "quit" "quit"
2023-05-31 16:52:51 +02:00
Description: Mounting the snapshot with its GUID
2023-08-23 08:17:56 +02:00
Usecase: Mounting the snapshot to access the ntds.dit with copy c:\[Snap Volume]\windows\ntds\ntds.dit c:\users\administrator\desktop\ntds.dit.bak
2023-05-31 16:52:51 +02:00
Category: Dump
Privileges: Administrator
2023-06-08 00:07:25 +02:00
MitreID: T1003.003
2023-08-23 08:17:56 +02:00
OperatingSystem: Windows Server 2012, Windows Server 2016, Windows Server 2019
- Command: dsdbutil.exe "activate instance ntds" "snapshot" "delete {GUID}" "quit" "quit"
2023-05-31 16:52:51 +02:00
Description: Deletes the mount of the snapshot
Usecase: Deletes the snapshot
Category: Dump
Privileges: Administrator
2023-06-08 00:07:25 +02:00
MitreID: T1003.003
2023-08-23 08:17:56 +02:00
OperatingSystem: Windows Server 2012, Windows Server 2016, Windows Server 2019
- Command: dsdbutil.exe "activate instance ntds" "snapshot" "create" "list all" "mount 1" "quit" "quit"
2023-05-31 16:52:51 +02:00
Description: Mounting with snapshot identifier
2023-08-23 08:17:56 +02:00
Usecase: Mounting the snapshot identifier 1 and accessing it with with copy c:\[Snap Volume]\windows\ntds\ntds.dit c:\users\administrator\desktop\ntds.dit.bak
2023-05-31 16:52:51 +02:00
Category: Dump
Privileges: Administrator
2023-06-08 00:07:25 +02:00
MitreID: T1003.003
2023-08-23 08:17:56 +02:00
OperatingSystem: Windows Server 2012, Windows Server 2016, Windows Server 2019
- Command: dsdbutil.exe "activate instance ntds" "snapshot" "list all" "delete 1" "quit" "quit"
2023-05-31 16:52:51 +02:00
Description: Deletes the mount of the snapshot
Usecase: deletes the snapshot
Category: Dump
Privileges: Administrator
2023-06-08 00:02:51 +02:00
MitreID: T1003.003
2023-08-23 08:17:56 +02:00
OperatingSystem: Windows Server 2012, Windows Server 2016, Windows Server 2019
2023-05-31 16:52:51 +02:00
Full_Path:
2023-08-23 08:17:56 +02:00
- Path: C:\Windows\System32\dsdbutil.exe
- Path: C:\Windows\SysWOW64\dsdbutil.exe
2023-05-31 16:52:51 +02:00
Code_Sample:
2023-08-23 08:17:56 +02:00
- Code:
2023-05-31 16:52:51 +02:00
Detection:
- IOC: Event ID 4688
- IOC: dsdbutil.exe process creation
- IOC: Event ID 4663
- IOC: Regular and Volume Shadow Copy attempts to read or modify ntds.dit
- IOC: Event ID 4656
- IOC: Regular and Volume Shadow Copy attempts to read or modify ntds.dit
2023-08-23 08:17:56 +02:00
- Analysis:
- Sigma:
- Elastic:
- Splunk:
- BlockRule:
2023-05-31 16:52:51 +02:00
Resources:
2023-08-23 08:17:56 +02:00
- Link: https://gist.github.com/bohops/88561ca40998e83deb3d1da90289e358
- Link: https://www.netwrix.com/ntds_dit_security_active_directory.html
2023-05-31 16:52:51 +02:00
Acknowledgement:
2023-08-22 18:43:43 +02:00
- Person: bohop
2023-08-23 08:10:06 +02:00
Handle: '@bohops'
2023-08-22 18:43:43 +02:00
- Person: Ekitji
2023-08-23 08:10:06 +02:00
Handle: '@eki_erk'