Powershell LocalAccount Manipulation

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Adversaries may manipulate accounts to maintain access to victim systems. Account manipulation may consist of any action that preserves adversary access to a compromised account, such as modifying credentials or permission groups

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "PowerShell Script Block Logged" AND SCRIPTEXECUTED contains "Disable-LocalUser,Enable-LocalUser,Get-LocalUser,Set-LocalUser,New-LocalUser,Rename-LocalUser,Remove-LocalUser" select Action1.HOSTNAME,Action1.MESSAGE,Action1.SCRIPTEXECUTED

Detection

Execution Mode

realtime

Log Sources

Windows

Author

frack113