heroui logo

Disabling Net User Account

Splunk Security Content

View Source
Summary
This detection rule identifies attempts to disable a user account using the `net.exe` utility via command line, which may suggest malicious activity, such as disrupting user availability for nefarious purposes. The rule relies on data from Endpoint Detection and Response (EDR) tools, particularly focusing on process execution logs and command-line arguments. If an adversary uses this command, they could be preparing for further attacks or trying to cover their tracks, leading to potential denial of service for legitimate users. The detection strategy involves checking for process instances that match the commands typically associated with disabling user accounts, thus providing valuable insights into unauthorized access attempts or account control changes.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1531
Created: 2025-01-24