Creation of a Local Hidden User Account by Registry
Sysmon registry detection of a local hidden user account.
Sigma rule (View on GitHub)
1title: Creation of a Local Hidden User Account by Registry
2id: 460479f3-80b7-42da-9c43-2cc1d54dbccd
3status: test
4description: Sysmon registry detection of a local hidden user account.
5references:
6 - https://twitter.com/SBousseaden/status/1387530414185664538
7author: Christian Burkard (Nextron Systems)
8date: 2021-05-03
9modified: 2022-08-05
10tags:
11 - attack.persistence
12 - attack.t1136.001
13logsource:
14 product: windows
15 category: registry_event
16detection:
17 selection:
18 TargetObject|contains: '\SAM\SAM\Domains\Account\Users\Names\'
19 TargetObject|endswith: '$'
20 Image|endswith: '\lsass.exe'
21 condition: selection
22falsepositives:
23 - Unknown
24level: high
References
Related rules
- Cisco Local Accounts
- Creation Of A Local User Account
- Creation Of An User Account
- Hidden Local User Creation
- Local User Creation