Summary
An attacker may utilize LDAP requests targeting the domain controller’sSystem container which contains the System Management container. This System Management container usually has GenericAll permissions set on the container object and contains the SCCM published site information. An attacker can query this container to resolve the potential site servers.
Defenders can set focused auditing on the System Management container to identify anomalous read access attempts. Defenders can enable a SACL (System Access Control List) on the System Management container and set the audit categories to monitor for Read all properties. Upon the querying of the System Management container within Active Directory Users and Computers, a Event ID: 4662 will highlight that a Read operation was performed on the container object.
The below example displays the sccmhunter.py find command to trigger the LDAP query:
System Management container:
Associated Offensive IDs
References
- Garrett Foster, SCCMHunter Find Module, https://github.com/garrettfoster13/sccmhunter/wiki/find
- Josh Prager & Nico Shyne, Domain Persistence: Detection Triage and Recovery, https://github.com/bouj33boy/Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024