Discovering enumeration by the enemy
While not strictly part of dynamic analysis, sometimes in malware analysis, an infection will be accompanied by active enumeration and interactivity by an adversary.
This is done primarily through reconnaissance tools downloaded to the host and executed. Different threat actors have different tools they prefer, but the idea is always the same: discover more hosts, with more vulnerabilities or users, and exploit those to gain a larger foothold within the network.
Domain checks
Some actors will utilize enumeration to decide whether a target is worth attacking at all – for instance, in some Emotet binary executions, the binary will issue commands to check for a domain such as net user /domain
to see what domain, if any, exists. If this check fails, it's likely not worth their time to interact with, and the execution may halt.
In the instance that a domain is found, the threat actor will probably attempt to enumerate the users...