Detectionhightest

Account Created And Deleted Within A Close Time Frame

Detects when an account was created and deleted in a short period of time.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Mark Morowczynski, Mike Duddington, Tim SheltonCreated Thu Aug 11Updated Thu Aug 186f583da0-3a90-4566-a4ed-83c09fe18bbfcloud
Log Source
Azureauditlogs
ProductAzure← raw: azure
Serviceauditlogs← raw: auditlogs
Detection Logic
Detection Logic1 selector
detection:
    selection:
        properties.message:
            - Add user
            - Delete user
        Status: Success
    condition: selection
False Positives

Legit administrative action

Rule Metadata
Rule ID
6f583da0-3a90-4566-a4ed-83c09fe18bbf
Status
test
Level
high
Type
Detection
Created
Thu Aug 11
Modified
Thu Aug 18
Path
rules/cloud/azure/audit_logs/azure_ad_account_created_deleted.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.initial-accessattack.defense-evasionattack.t1078
View on GitHub