heroui logo

Account Password Changed from Command Line - Windows

Anvilogic Forge

View Source
Summary
This detection rule focuses on identifying instances where account passwords may have been changed through the command line on Windows systems. The primary intent of the rule is to detect unauthorized attempts by adversaries attempting to manipulate account access—specifically, the use of the 'net.exe' command with parameters indicating a user password change. The SQL-like query checks for recent process commands on Windows platforms that fit the pattern of 'net user [username] [newpassword]'. By focusing on processes invoked within the last two hours, the rule aids in the timely detection of potential security incidents where legitimate accounts are compromised, thus helping to maintain the integrity and availability of user access to critical resources.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
  • User Account
ATT&CK Techniques
  • T1531
Created: 2024-02-09