heroui logo

Short Lived Windows Accounts

Splunk Security Content

View Source
Summary
This detection rule identifies suspicious activities involving the rapid creation and deletion of Windows user accounts within a one-hour window. By monitoring specific Event IDs (4720 for account creation and 4726 for account deletion) in the Windows Event Log, this rule can help uncover potential malicious activities, such as an attacker attempting to gain unauthorized access by quickly creating and then deleting accounts to evade detection. The investigation of such activities is critical, as they may indicate efforts by malicious actors to manipulate system resources or escalate privileges. The analysis relies on the 'Change' data model within Splunk, utilizing a tailored search query to capture relevant log data for further inspection.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1078
  • T1136.001
  • T1136
  • T1078.003
Created: 2024-11-22