heroui logo

Hide User Account From Sign-In Screen

Splunk Security Content

View Source
Summary
The analytic rule named 'Hide User Account From Sign-In Screen' identifies suspicious modifications to the Windows registry that may indicate an attempt by an adversary to conceal a user account from the Windows login interface. This rule specifically monitors changes to the registry path associated with user accounts, particularly focusing on entries that result in a value of '0x00000000' under 'SpecialAccounts' within the 'Winlogon' subtree. Such modifications are often linked to adversarial behavior seeking to establish covert persistent access on a compromised host, potentially allowing attackers to bypass detection mechanisms and maintain unauthorized control over the system. The detection logic leverages Sysmon event IDs 12 and 13, assessing registry activity from endpoints to raise alerts regarding possible credential harvesting or escalation tactics deployed by intruders. If flagged as malicious, such changes represent a critical security risk that necessitates immediate investigation and remediation.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Image
  • File
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-12-08