Files
hayabusa/rules/sigma/builtin/security/win_user_creation.yml
itiB 83d891b2fa Feature/rm submodule (#312)
* rm: submodule

* Add: rules

* Fix: hayabusa-rules to c9c10a
2021-12-20 21:14:32 +09:00

35 lines
887 B
YAML

title: Local User Creation
ruletype: Sigma
author: Patrick Bareiss
date: 2019/04/18
description: Detects local user creation on windows servers, which shouldn't happen
in an Active Directory environment. Apply this Sigma Use Case on your windows server
logs and not on your DC logs.
detection:
SELECTION_1:
provider_Name: Microsoft-Windows-Security-Auditing
SELECTION_2:
EventID: 4720
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- Domain Controller Logs
- Local accounts managed by privileged account management tools
fields:
- EventCode
- AccountName
- AccountDomain
id: 66b6be3d-55d0-4f47-9855-d69df21740ea
level: low
logsource:
product: windows
service: security
modified: 2021/11/30
references:
- https://patrick-bareiss.com/detecting-local-user-creation-in-ad-with-sigma/
status: test
tags:
- attack.persistence
- attack.t1136
- attack.t1136.001