Account Discovery Command via SYSTEM Account
The rule identifies when the SYSTEM account uses an account discovery utility, potentially indicating discovery activity after privilege escalation, focusing on utilities like whoami.exe and net1.exe executed under the SYSTEM account.
This detection rule identifies instances where the SYSTEM account is used to execute account discovery utilities, such as whoami.exe and net1.exe. This behavior is commonly observed after an attacker has successfully achieved privilege escalation within a Windows environment, or after exploiting a web application. The rule is designed to detect post-exploitation discovery activity where an adversary attempts to gain situational awareness by enumerating accounts and system information using the elevated SYSTEM context. The rule leverages data from Elastic Defend and Sysmon Event ID 1 to identify these behaviors, helping defenders spot potential privilege escalation and lateral movement attempts. The original rule was created 2020/03/18 and updated 2026/05/04.
Attack Chain
- An attacker gains initial access to a system, potentially through exploiting a vulnerability in a web application or through phishing.
- The attacker escalates privileges to the SYSTEM account, possibly by exploiting a local privilege escalation vulnerability.
- The attacker executes
whoami.exeornet1.exevia the SYSTEM account to enumerate user accounts and gather system information. - The
whoami.exeornet1.exeprocess is spawned by a parent process such as a web server process (e.g., w3wp.exe) or a service process. - The attacker uses the discovered account information to plan further actions, such as lateral movement or credential theft.
- The attacker may use
net1.exeto query domain information. - The attacker leverages the gained information to identify valuable targets within the network.
- The final objective is often data exfiltration, deployment of ransomware, or further compromise of the network.
Impact
A successful attack can lead to unauthorized access to sensitive data, lateral movement within the network, and potential data exfiltration or ransomware deployment. Although this rule has low severity, the execution of discovery commands by the SYSTEM account can be a critical indicator of compromise. Early detection of such activity can prevent more severe damage.
Recommendation
- Deploy the provided Sigma rules to detect account discovery commands executed via the SYSTEM account and tune for your environment.
- Enable Sysmon process creation logging (Event ID 1) to ensure the necessary data is available for detection.
- Investigate any alerts generated by these rules, focusing on the process execution chain to identify the source of the SYSTEM account usage.
- If the process tree includes a web-application server process, investigate suspicious file creation or modification to assess for webshell backdoors.
- Review and harden web application security to prevent initial access and privilege escalation.
Detection coverage 3
Account Discovery via SYSTEM Account - whoami.exe
mediumDetects execution of whoami.exe by the SYSTEM account, indicating potential post-exploitation discovery activity.
Account Discovery via SYSTEM Account - net1.exe
mediumDetects execution of net1.exe by the SYSTEM account, excluding legitimate uses.
Account Discovery via SYSTEM Account - net1.exe without cmd.exe
mediumDetects execution of net1.exe by the SYSTEM account when not using cmd.exe, indicating potential post-exploitation discovery activity.
Detection queries are kept inside the platform. Get full rules →