Common Information
Type Value
Value
Create Account - T1136
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries with a sufficient level of access may create a local system or domain account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system. The <code>net user</code> commands can be used to create a local or domain account. Detection: Collect data on account creation within a network. Event ID 4720 is generated when a user account is created on a Windows system and domain controller. (Citation: Microsoft User Creation Event) Perform regular audits of domain and local system accounts to detect suspicious accounts that may have been created by an adversary. Platforms: Linux, macOS, Windows Data Sources: Process Monitoring, Process command-line parameters, Authentication logs, Windows event logs Permissions Required: Administrator
Details Published Attributes CTI Title
Details Website 2021-08-19 8 Here's another free CA as an alternative to Let's Encrypt!
Details Website 2021-07-28 10 Phases of a Post-Intrusion Ransomware Attack
Details Website 2021-07-10 106 Common Tools & Techniques Used By Threat Actors and Malware — Part I
Details Website 2021-06-15 53 Handy guide to a new Fivehands ransomware variant
Details Website 2021-04-27 236 Lazarus Group Recruitment: Threat Hunters vs Head Hunters
Details Website 2021-04-21 36 Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03)
Details Website 2021-04-20 102 Authentication Bypass Techniques and Pulse Secure Zero-Day
Details Website 2021-03-11 27 You Don't Know the HAFNIUM of it...
Details Website 2021-03-09 8 Hafnium Microsoft Hack– Active Exploitation of Microsoft Exchange and Lateral Movement
Details Website 2021-03-03 28 Detecting HAFNIUM Exchange Server Zero-Day Activity in Splunk
Details Website 2018-09-27 6 Application Licensing with Blockchain: EOS Network | Apriorit
Details Website 2018-07-06 5 Categorizing and Enriching Security Events in an ELK with the Help of Sysmon and ATT&CK
Details Website 2017-10-21 605 Phobos
Details Website 2017-02-07 3 Tax Refund Scams: Benefits to filing early and often
Details Website 2017-01-01 1 SWIFT login
Details Website 2012-05-30 1 Using BackTrack 5 R2 with Metasploit Community or Metasploit Pro | Rapid7 Blog