Hidden Local Account Detection

Rule added on 30th May, 2024

Rule type:

Correlation

Rule description:

Attackers may attempt to create a hidden local user account by appending the dollar sign to the account name. This may be done by them to increase access to a system and avoid appearing in the results of accounts listing using the net users command.

Attack chain scenario: Phishing -> Credential theft -> Hidden local account creation -> Ransomware deployment

Impact:

It can impact the organizations in the following ways:

  • Data theft
  • Malware deployment
  • Backdoor establishment

Data source:

Windows > User Management

Required configuration: The rule is based on the user creation and user management policy. Prerequisites required are enabling the audit user management policy.

Relevant MITRE ATT&CK techniques and tactics:

Tactic: TA0003- Persistence

Technique: T1136- Create Account

Sub Technique: T1136.001- Local Account

Criteria:

In Windows environment, the $ symbol is conventionally used for hidden or system accounts that are meant not to be easily accessible but hidden from users.

The command checks if the user account being created ends with a $ sign.

When to enable this rule:

Security standards (NIST CSF 2.0):

Enabling this rule will help you meet the security standard's requirement listed below:

PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties

When this rule is triggered, you're notified of the creation of a hidden local user account by appending the dollar sign to the account name. This enables you to review access and permissions, take corrective actions, and incorporate the least privilege policy.

Known false positives: It is quite unlikely for this event to be generated legitimately.

Next steps:

When this alert is triggered, the following measures can be implemented:

  • Identification: Identify if the alert is a new incident or part of an existing incident.
  • Analysis: Analyze the impact and extent of the compromise to comprehend the severity of the attack.
  • Response: Respond promptly by initiating an automated workflow to cease the malicious process.
  • Deploy access controls: Implement access controls and permissions to restrict the account creation by unauthorized users.