heroui logo

Windows Account Access Removal via Logoff Exec

Splunk Security Content

View Source
Summary
This analytic rule focuses on detecting instances where a user session on a Windows system is terminated through the execution of the 'logoff.exe' command. The primary purpose is to identify potential unauthorized access attempts or administrative actions that forcibly log off a user, which may signal misuse or malicious behavior related to account management. The rule utilizes data from Sysmon Event ID 1 to monitor for the 'logoff.exe' process among other associated attributes such as the parent process, user, and destination system. Care must be taken, as legitimate administrative users might invoke the logoff command as part of their routine tasks, leading to possible false positives. By pinpointing these logoff events, security teams can gain insights into account manipulation and investigate security incidents more effectively.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1531
  • T1059.001
  • T1059
Created: 2024-12-17