Adversaries may attempt to gather information on domain trust relationships that may be used to identify lateral movement opportunities in Windows multi-domain/forest environments. Domain trusts provide a mechanism for a domain to allow access to resources based on the authentication procedures of another domain.[1] Domain trusts allow the users of the trusted domain to access resources in the trusting domain. The information discovered may help the adversary conduct SID-History Injection, Pass the Ticket, and Kerberoasting.[2][3] Domain trusts can be enumerated using the DSEnumerateDomainTrusts() Win32 API call, .NET methods, and LDAP.[3] The Windows utility Nltest is known to be used by adversaries to enumerate domain trusts.[4]
| ID | Name | Description |
|---|---|---|
| S0552 | AdFind |
AdFind can gather information about organizational units (OUs) and domain trusts from Active Directory.[5][6][7][8] |
| G1024 | Akira |
Akira uses the built-in Nltest utility or tools such as AdFind to enumerate Active Directory trusts in victim environments.[9] |
| S1081 | BADHATCH |
BADHATCH can use |
| S0534 | Bazar |
Bazar can use Nltest tools to obtain information about the domain.[11][12] |
| G1043 | BlackByte |
BlackByte enumerated Active Directory information and trust relationships during operations.[13][14] |
| S0521 | BloodHound |
BloodHound has the ability to map domain trusts and identify misconfigurations for potential abuse.[15] |
| S1063 | Brute Ratel C4 |
Brute Ratel C4 can use LDAP queries and |
| C0015 | C0015 |
During C0015, the threat actors used the command |
| G0114 | Chimera |
Chimera has |
| S0105 | dsquery |
dsquery can be used to gather information on domain trusts with |
| S1159 | DUSTTRAP |
DUSTTRAP can identify Active Directory information and related items.[20] |
| G1006 | Earth Lusca |
Earth Lusca has used Nltest to obtain information about domain controllers.[21] |
| S0363 | Empire | |
| G0061 | FIN8 |
FIN8 has retrieved a list of trusted domains by using |
| S0483 | IcedID | |
| S1160 | Latrodectus |
Latrodectus can run |
| C0049 | Leviathan Australian Intrusions |
Leviathan performed Active Directory enumeration of victim environments during Leviathan Australian Intrusions.[28] |
| G0030 | Lotus Blossom |
Lotus Blossom has used tools such as AdFind to make Active Directory queries.[29] |
| G0059 | Magic Hound |
Magic Hound has used a web shell to execute |
| S1146 | MgBot |
MgBot includes modules for collecting information on local domain users and permissions.[31] |
| S0359 | Nltest |
Nltest may be used to enumerate trusted domains by using commands such as |
| S1145 | Pikabot |
Pikabot will gather information concerning the Windows Domain the victim machine is a member of during execution.[34] |
| S0378 | PoshC2 | |
| S0194 | PowerSploit |
PowerSploit has modules such as |
| S0650 | QakBot |
QakBot can run |
| S1071 | Rubeus | |
| S1124 | SocGholish |
SocGholish can profile compromised systems to identify domain trust relationships.[41][42] |
| C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 used the |
| G1053 | Storm-0501 |
Storm-0501 has used Windows native utility Nltest |
| G1046 | Storm-1811 |
Storm-1811 has enumerated domain accounts and access during intrusions.[47] |
| S0266 | TrickBot |
TrickBot can gather information about domain trusts by utilizing Nltest.[33][48] |
| ID | Mitigation | Description |
|---|---|---|
| M1047 | Audit |
Map the trusts within existing domains/forests and keep trust relationships to a minimum. |
| M1030 | Network Segmentation |
Employ network segmentation for sensitive domains.[3]. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0007 | Detection of Domain Trust Discovery via API, Script, and CLI Enumeration | AN0016 |
Adversary uses nltest, PowerShell, or Win32/.NET API to enumerate domain trust relationships (via DSEnumerateDomainTrusts, GetAllTrustRelationships, or LDAP queries), followed by discovery or authentication staging. |