EXPLORE
← Back to Explore
sigmamediumHunting

Privileged Account Creation

Detects when a new admin is created.

MITRE ATT&CK

initial-accessdefense-evasionpersistenceprivilege-escalation

Detection Query

selection:
  properties.message|contains|all:
    - Add user
    - Add member to role
  Status: Success
condition: selection

Author

Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H', Tim Shelton

Created

2022-08-11

Data Sources

azureauditlogs

Platforms

azure

Tags

attack.initial-accessattack.defense-evasionattack.persistenceattack.privilege-escalationattack.t1078.004
Raw Content
title: Privileged Account Creation
id: f7b5b004-dece-46e4-a4a5-f6fd0e1c6947
status: test
description: Detects when a new admin is created.
references:
    - https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts#changes-to-privileged-accounts
author: Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H', Tim Shelton
date: 2022-08-11
modified: 2022-08-16
tags:
    - attack.initial-access
    - attack.defense-evasion
    - attack.persistence
    - attack.privilege-escalation
    - attack.t1078.004
logsource:
    product: azure
    service: auditlogs
detection:
    selection:
        properties.message|contains|all:
            - Add user
            - Add member to role
        Status: Success
    condition: selection
falsepositives:
    - A legitimate new admin account being created
level: medium