<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>User-Account-Creation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/user-account-creation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/user-account-creation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows User Account Creation via Net.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-user-account-creation/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-user-account-creation/</guid><description>This rule identifies attempts to create new users on Windows systems using net.exe, a common tactic used by attackers to increase access or establish persistence.</description><content:encoded><![CDATA[<p>Attackers may create new accounts (both local and domain) to maintain access to victim systems. This rule identifies the usage of <code>net.exe</code> to create new accounts on Windows systems. The detection logic focuses on process execution events where <code>net.exe</code> or <code>net1.exe</code> are executed with arguments indicative of user creation, specifically the &lsquo;user&rsquo; argument in conjunction with either the &lsquo;/ad&rsquo; or &lsquo;/add&rsquo; flags. While account creation is a common administrative task, suspicious executions, especially those initiated by unusual parent processes or accounts, warrant further investigation. This rule is designed for data generated by Elastic Defend but also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel, enhancing its applicability across various security environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means, such as exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker opens a command prompt or PowerShell session.</li>
<li>The attacker uses <code>net.exe</code> or <code>net1.exe</code> to create a new user account. The command includes the <code>user</code> argument along with <code>/add</code> or <code>/ad</code> flags. For example: <code>net user &lt;username&gt; &lt;password&gt; /add</code>.</li>
<li>The attacker may add the newly created user to privileged groups, such as <code>Administrators</code> or <code>Domain Admins</code>, to elevate privileges.</li>
<li>The attacker uses the new account to move laterally within the network, accessing sensitive data or systems.</li>
<li>The attacker establishes persistence by configuring the new account to be a service account or adding it to local administrator groups.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, lateral movement within the network, and long-term persistence on compromised systems. The impact is often determined by the privileges assigned to the newly created account. If the attacker adds the account to the <code>Administrators</code> group, they can effectively take full control of the affected system. In a domain environment, creating a domain account can lead to wider compromise across the entire network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation logging to capture the necessary events for the rules below.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Investigate any instances of <code>net.exe</code> or <code>net1.exe</code> creating user accounts, especially when initiated by unusual parent processes.</li>
<li>Monitor for newly created accounts being added to privileged groups.</li>
<li>Review the triage and analysis steps in the rule&rsquo;s original documentation for guidance on investigating and responding to potential incidents.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>user-account-creation</category><category>windows</category></item></channel></rss>