Windows User Account Creation
Identifies attempts to create a Windows User Account. This is sometimes done by attackers to persist or increase access to a system or domain.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2021/01/04"
3integration = ["system", "windows"]
4maturity = "development"
5updated_date = "2024/10/28"
6min_stack_version = "8.14.0"
7min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
8
9[rule]
10author = ["Skoetting"]
11description = """
12Identifies attempts to create a Windows User Account. This is sometimes done by attackers to persist or increase access
13to a system or domain.
14"""
15false_positives = [
16 """
17 Legitimate local user creations may be done by a system or network administrator. Verify whether this is known
18 behavior in your environment. Local user creations by unfamiliar users or hosts should be investigated. If known
19 behavior is causing false positives, it can be exempted from the rule.
20 """,
21]
22index = ["winlogbeat-*", "logs-system.*", "logs-windows.*"]
23language = "kuery"
24license = "Elastic License v2"
25name = "Windows User Account Creation"
26risk_score = 21
27rule_id = "38e17753-f581-4644-84da-0d60a8318694"
28severity = "low"
29tags = ["Domain: Endpoint", "OS: Windows", "Use Case: Threat Detection", "Tactic: Persistence", "Data Source: System"]
30timestamp_override = "event.ingested"
31type = "query"
32
33query = '''
34event.module:("system" or "security") and winlog.api:"wineventlog" and
35 (event.code:"4720" or event.action:"added-user-account")
36'''
37
38
39[[rule.threat]]
40framework = "MITRE ATT&CK"
41[[rule.threat.technique]]
42id = "T1136"
43name = "Create Account"
44reference = "https://attack.mitre.org/techniques/T1136/"
45[[rule.threat.technique.subtechnique]]
46id = "T1136.001"
47name = "Local Account"
48reference = "https://attack.mitre.org/techniques/T1136/001/"
49
50[[rule.threat.technique.subtechnique]]
51id = "T1136.002"
52name = "Domain Account"
53reference = "https://attack.mitre.org/techniques/T1136/002/"
54
55
56
57[rule.threat.tactic]
58id = "TA0003"
59name = "Persistence"
60reference = "https://attack.mitre.org/tactics/TA0003/"
Related rules
- Account Configured with Never-Expiring Password
- AdminSDHolder Backdoor
- Sensitive Privilege SeEnableDelegationPrivilege assigned to a User
- A scheduled task was created
- A scheduled task was updated