dsquery

dsquery is a command-line utility that can be used to query Active Directory for information from a system within a domain. [1] It is typically installed only on Windows Server versions but can be installed on non-server variants through the Microsoft-provided Remote Server Administration Tools bundle.

ID: S0105
Associated Software: dsquery.exe
Type: TOOL
Platforms: Windows
Version: 1.4
Created: 31 May 2017
Last Modified: 04 January 2023

Techniques Used

Domain ID Name Use
Enterprise T1087 .002 Account Discovery: Domain Account

dsquery can be used to gather information on user accounts within a domain.[1][2]

Enterprise T1482 Domain Trust Discovery

dsquery can be used to gather information on domain trusts with dsquery * -filter "(objectClass=trustedDomain)" -attr *.[3]

Enterprise T1069 .002 Permission Groups Discovery: Domain Groups

dsquery can be used to gather information on permission groups within a domain.[1][2]

Enterprise T1082 System Information Discovery

dsquery has the ability to enumerate various information, such as the operating system and host name, for systems within a domain.[2]

Groups That Use This Software

ID Name References
G0061 FIN8

[4]

G0096 APT41

[2]

Campaigns

ID Name Description
C0017 C0017

During C0017, APT41 used multiple dsquery commands to enumerate various Active Directory objects within a compromised environment.[2]

C0012 Operation CuckooBees

[5]

C0014 Operation Wocao

During Operation Wocao, threat actors used dsquery to retrieve all subnets in the Active Directory.[6]

References