Detectionhightest
Creation of a Local Hidden User Account by Registry
Sysmon registry detection of a local hidden user account.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Christian Burkard (Nextron Systems)Created Mon May 03Updated Fri Oct 31460479f3-80b7-42da-9c43-2cc1d54dbccdwindows
Log Source
WindowsRegistry Event
ProductWindows← raw: windows
CategoryRegistry Event← raw: registry_event
Events for Windows Registry modifications including key creation, modification, and deletion.
Detection Logic
Detection Logic1 selector
detection:
selection:
TargetObject|contains: '\SAM\SAM\Domains\Account\Users\Names\'
TargetObject|endswith: '$\(Default)'
Image|endswith: '\lsass.exe'
condition: selectionFalse Positives
Unknown
False positive likelihood has not been assessed. Additional context may be needed during triage.
References
Testing & Validation
Simulations
atomic-red-teamT1564.002
View on ARTCreate Hidden User in Registry
GUID: 173126b7-afe4-45eb-8680-fa9f6400431c
MITRE ATT&CK
Tactics
Sub-techniques
Rule Metadata
Rule ID
460479f3-80b7-42da-9c43-2cc1d54dbccd
Status
test
Level
high
Type
Detection
Created
Mon May 03
Modified
Fri Oct 31
Path
rules/windows/registry/registry_event/registry_event_add_local_hidden_user.yml
Raw Tags
attack.persistenceattack.t1136.001