<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Account-Discovery — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/account-discovery/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 17:14:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/account-discovery/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Account Discovery of Administrator Accounts</title><link>https://feed.craftedsignal.io/briefs/2024-01-admin-recon/</link><pubDate>Wed, 03 Jan 2024 17:14:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-admin-recon/</guid><description>Adversaries may execute the `net.exe` or `wmic.exe` commands to enumerate administrator accounts or groups, both locally and within the domain, to gather information for follow-on actions.</description><content:encoded><![CDATA[<p>Attackers often perform reconnaissance activities within a compromised environment to understand the available resources and potential targets. This reconnaissance helps them plan subsequent actions, such as privilege escalation and lateral movement. This activity involves using built-in Windows utilities like <code>net.exe</code> and <code>wmic.exe</code> to enumerate administrator-related user accounts and groups. This information can reveal potential targets for credential compromise or other post-exploitation activities. Lower privileged accounts commonly perform this enumeration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system.</li>
<li>The attacker executes <code>net.exe</code> with arguments to list users and groups.</li>
<li>The attacker filters the output for administrator-related keywords like &ldquo;admin&rdquo;, &ldquo;Domain Admins&rdquo;, &ldquo;Enterprise Admins&rdquo;, &ldquo;Remote Desktop Users&rdquo;, or &ldquo;Organization Management&rdquo;.</li>
<li>Alternatively, the attacker executes <code>wmic.exe</code> to query user accounts.</li>
<li>The attacker parses the output from <code>wmic.exe</code> to identify administrator accounts.</li>
<li>The attacker identifies privileged accounts to target for credential theft or privilege escalation.</li>
<li>The attacker uses the identified accounts to perform lateral movement or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of administrator accounts allows an attacker to identify high-value targets within the environment. This can lead to credential theft, privilege escalation, lateral movement, and ultimately, unauthorized access to sensitive data or systems. While the risk score is low, this activity serves as a precursor to more serious compromises.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for <code>net.exe</code> and <code>wmic.exe</code> commands with arguments related to user and group enumeration using the Sigma rules provided.</li>
<li>Investigate any instances of lower-privileged accounts executing these commands and filter out authorized administrative accounts performing the same actions.</li>
<li>Enable Windows process creation logging to capture the necessary events.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>account-discovery</category><category>windows</category></item></channel></rss>