<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Logs-Windows.forwarded* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/logs-windows.forwarded/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 19:00:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/logs-windows.forwarded/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unusual dMSA Account Creation for Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-dmsa-creation/</link><pubDate>Tue, 12 May 2026 19:00:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dmsa-creation/</guid><description>Detects the creation of a delegated Managed Service Account (dMSA) by an unusual subject account, potentially indicating an attempt to abuse weak permissions for privilege escalation in Active Directory.</description><content:encoded><![CDATA[<p>This detection rule identifies the creation of delegated Managed Service Accounts (dMSAs) by accounts that are not typically associated with such actions. Attackers can exploit misconfigured permissions, specifically weak child-object or msDS-DelegatedManagedServiceAccount rights, during account migration processes to elevate their privileges within an Active Directory environment. This technique allows adversaries to gain control over sensitive resources and compromise the overall security of the domain. The detection focuses on Windows systems where Active Directory is deployed. The rule leverages Windows Security Event Logs to identify suspicious dMSA creation events. Defenders should investigate any detected instances of unusual dMSA creation, as they may indicate malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a low-privileged account within the Active Directory domain.</li>
<li>The attacker identifies an opportunity to abuse weak permissions related to dMSA creation, focusing on child-object or msDS-DelegatedManagedServiceAccount rights.</li>
<li>The attacker uses the compromised account to create a new msDS-DelegatedManagedServiceAccount object within Active Directory. This is logged as event ID 5137.</li>
<li>The attacker modifies attributes of the newly created dMSA object to link it to a privileged predecessor or advance its migration state. These modifications generate event ID 5136.</li>
<li>The attacker assigns Service Principal Names (SPNs) to the dMSA, enabling it to authenticate to services within the domain.</li>
<li>The attacker configures delegation settings on the dMSA, granting it the ability to impersonate other users or services.</li>
<li>The attacker adds the dMSA to privileged groups, further escalating its privileges within the domain.</li>
<li>The attacker uses the compromised dMSA to access sensitive resources and perform unauthorized actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to significant privilege escalation within the Active Directory domain. An attacker could gain control over critical systems, access sensitive data, and potentially compromise the entire domain infrastructure. This can result in data breaches, financial losses, and reputational damage. The number of affected systems depends on the scope of the attacker&rsquo;s access and the criticality of the compromised resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Changes to generate the necessary Windows Security Event Logs for detection (reference: Setup section in rule content).</li>
<li>Deploy the provided Sigma rule to your SIEM to detect unusual dMSA creation events (reference: rules section below).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the ObjectDN, SubjectUserName, and related 5136 events to determine if the dMSA creation is legitimate (reference: rule <code>description</code> and <code>note</code> sections).</li>
<li>Monitor for event ID 5136 related to msDS-ManagedAccountPrecededByLink, msDS-DelegatedMSAState, SPNs, delegation attributes, or gMSA membership on newly created dMSAs (reference: <code>note</code> section).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>windows</category></item></channel></rss>