heroui logo

New User Created Via Net.EXE

Sigma Rules

View Source
Summary
This detection rule identifies the creation of local user accounts via the `net.exe` command on Windows systems. The rule focuses on processes related to the execution of `net.exe` or `net1.exe`, particularly in the context of user management tasks such as adding new user accounts. Specifically, the rule triggers on command-line arguments that include 'user' and 'add', indicating a potential attempt to create a new user. This kind of activity could be indicative of unauthorized user creation by an attacker attempting to gain persistent access to a system. The rule utilizes process creation logs, which are a crucial data point for threat detection, to monitor these specific commands. False positives may arise from legitimate administrative activities that involve user account creation. Therefore, it is advised to corroborate findings with event IDs related to user account management for accuracy in threat identification.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1136.001
Created: 2018-10-30