Detectionlowtest
Local Accounts Discovery
Local accounts, System Owner/User discovery using operating systems utilities
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Timur Zinniatullin, Daniil Yugoslavskiy, oscd.communityCreated Mon Oct 21Updated Mon Oct 20502b42de-4306-40b4-9596-6f590c81f073windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation
Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.
Detection Logic
Detection Logic7 selectors
detection:
selection_other_img:
- Image|endswith:
- '\whoami.exe'
- '\quser.exe'
- '\qwinsta.exe'
- OriginalFileName:
- 'whoami.exe'
- 'quser.exe'
- 'qwinsta.exe'
selection_other_wmi:
Image|endswith: '\wmic.exe'
CommandLine|contains|all:
- 'useraccount'
- 'get'
selection_other_cmdkey:
Image|endswith: '\cmdkey.exe'
CommandLine|contains: ' /l'
selection_cmd:
Image|endswith: '\cmd.exe'
CommandLine|contains|all:
- ' /c'
- 'dir '
- '\Users\'
filter_cmd:
CommandLine|contains: ' rmdir ' # don't match on 'dir' "C:\Windows\System32\cmd.exe" /q /c rmdir /s /q "C:\Users\XX\AppData\Local\Microsoft\OneDrive\19.232.1124.0005"
selection_net:
Image|endswith:
- '\net.exe'
- '\net1.exe'
CommandLine|contains: 'user'
filter_net:
CommandLine|contains:
- '/domain' # local account discovery only
- '/add' # discovery only
- '/delete' # discovery only
- '/active' # discovery only
- '/expires' # discovery only
- '/passwordreq' # discovery only
- '/scriptpath' # discovery only
- '/times' # discovery only
- '/workstations' # discovery only
condition: (selection_cmd and not filter_cmd) or (selection_net and not filter_net) or 1 of selection_other_*False Positives
Legitimate administrator or user enumerates local users for legitimate reason
References
MITRE ATT&CK
Tactics
Techniques
Sub-techniques
Related Rules
Similar
Rule not founde28a5a99-da44-436d-b7a0-2afc20a5f413
Rule Metadata
Rule ID
502b42de-4306-40b4-9596-6f590c81f073
Status
test
Level
low
Type
Detection
Created
Mon Oct 21
Modified
Mon Oct 20
Path
rules/windows/process_creation/proc_creation_win_susp_local_system_owner_account_discovery.yml
Raw Tags
attack.discoveryattack.t1033attack.t1087.001