
Summary
The rule titled 'Windows User Account Creation' is designed to detect attempts to create a Windows user account, which may indicate malicious activities aimed at persistence or privilege escalation by attackers. The detection leverages Windows event logs, specifically focusing on events related to user account creation—identified by the event codes '4720' and the action 'added-user-account'. The rule operates on Windows systems and analyzes events generated by the System or Security module; therefore, it is crucial for security teams to monitor for unauthorized account creations. A risk score of 21 with low severity indicates that while the event may not always signal immediate danger, it warrants careful examination to prevent potential security breaches. The false-positive scenarios include legitimate account creations performed by system administrators, automated scripts, or temporary accounts for contractors, which need to be properly documented to avoid unnecessary alerts. The rule also includes a thorough guidance for incident response, starting from isolating the affected system to reviewing logs for suspicious behaviors, thereby empowering security analysts during investigations. The technique is associated with MITRE ATT&CK under the tactic of Persistence with an emphasis on the 'Create Account' techniques.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Logon Session
- Application Log
- Process
- User Account
- Command
ATT&CK Techniques
- T1136
- T1136.001
- T1136.002
Created: 2021-01-04