← Back to SOC feed Coverage →

NTDS theft

kql MEDIUM Azure-Sentinel
DeviceProcessEvents
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-04-25T09:00:00Z · Confidence: medium

Hunt Hypothesis

The NTDS theft hypothesis detects adversaries using ntdsutil.exe to exfiltrate the Active Directory database, a critical asset for maintaining domain control. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential long-term persistence and lateral movement within the network.

KQL Query

DeviceProcessEvents
| where FileName =~ "ntdsutil.exe"
| where ProcessCommandLine has_any("full", "fu")
| where ProcessCommandLine has_any ("temp", "perflogs", "programdata")
// Exclusion
| where ProcessCommandLine !contains @"Backup"

Analytic Rule Definition

id: 2a03d94e-991b-44f7-a2b3-e12ce6fd6c57
name: NTDS theft
description: |
  Microsoft has observed compromises related to Bazacall resulting in theft of the Active Directory database using ntdsutil.exe.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceProcessEvents
tactics:
- Credential Access
- Exfiltration
query: |
  DeviceProcessEvents
  | where FileName =~ "ntdsutil.exe"
  | where ProcessCommandLine has_any("full", "fu")
  | where ProcessCommandLine has_any ("temp", "perflogs", "programdata")
  // Exclusion
  | where ProcessCommandLine !contains @"Backup"

Required Data Sources

Sentinel TableNotes
DeviceProcessEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/Bazacall/NTDS theft.yaml