Detectionhightest

Hiding User Account Via SpecialAccounts Registry Key

Detects modifications to the registry key "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist" where the value is set to "0" in order to hide user account from being listed on the logon screen.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Nasreddine Bencherchali (Nextron Systems), François HubautCreated Tue Jul 12Updated Thu Jan 26f8aebc67-a56d-4ec9-9fbe-7b0e8b7b4efdwindows
Log Source
WindowsRegistry Set
ProductWindows← raw: windows
CategoryRegistry Set← raw: registry_set
Detection Logic
Detection Logic1 selector
detection:
    selection:
        TargetObject|contains: '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList'
        Details: 'DWORD (0x00000000)'
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Testing & Validation

Simulations

atomic-red-teamT1564.002
View on ART

Create Hidden User in Registry

GUID: 173126b7-afe4-45eb-8680-fa9f6400431c

Regression Tests

by SigmaHQ Team
Positive Detection Test1 matchevtx

Microsoft-Windows-Sysmon

Rule Metadata
Rule ID
f8aebc67-a56d-4ec9-9fbe-7b0e8b7b4efd
Status
test
Level
high
Type
Detection
Created
Tue Jul 12
Modified
Thu Jan 26
Path
rules/windows/registry/registry_set/registry_set_special_accounts.yml
Raw Tags
attack.defense-evasionattack.t1564.002
View on GitHub