EXPLORE
← Back to Explore
sigmalowHunting

Creation Of A Local User Account

Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system.

MITRE ATT&CK

persistence

Detection Query

selection_dscl:
  Image|endswith: /dscl
  CommandLine|contains: create
selection_sysadminctl:
  Image|endswith: /sysadminctl
  CommandLine|contains: addUser
condition: 1 of selection_*

Author

Alejandro Ortuno, oscd.community

Created

2020-10-06

Data Sources

macosProcess Creation Events

Platforms

macos

Tags

attack.t1136.001attack.persistence
Raw Content
title: Creation Of A Local User Account
id: 51719bf5-e4fd-4e44-8ba8-b830e7ac0731
status: test
description: Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system.
references:
    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1136.001/T1136.001.md
    - https://ss64.com/osx/sysadminctl.html
author: Alejandro Ortuno, oscd.community
date: 2020-10-06
modified: 2023-02-18
tags:
    - attack.t1136.001
    - attack.persistence
logsource:
    category: process_creation
    product: macos
detection:
    selection_dscl:
        Image|endswith: '/dscl'
        CommandLine|contains: 'create'
    selection_sysadminctl:
        Image|endswith: '/sysadminctl'
        CommandLine|contains: 'addUser'
    condition: 1 of selection_*
falsepositives:
    - Legitimate administration activities
level: low