EXPLORE
← Back to Explore
T1033

System Owner/User Discovery

Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is actively using the system. They may do this, for example, by retrieving account usernames or by using [OS Credential Dumping](https://attack.mitre.org/techniques/T1003). The information may be collected in a number of different ways using other Discovery techniques, because user and username details are prevalent throughout a system and include running pr...

LinuxmacOSNetwork DevicesWindows
59
Detections
3
Sources
38
Threat Actors

BY SOURCE

29sigma16elastic14splunk_escu

PROCEDURES (33)

Process Creation Monitoring14 detections

Auto-extracted: 14 detections for process creation monitoring

Script Execution Monitoring3 detections

Auto-extracted: 3 detections for script execution monitoring

Child Process3 detections

Auto-extracted: 3 detections for child process

Privilege3 detections

Auto-extracted: 3 detections for privilege

Powershell2 detections

Auto-extracted: 2 detections for powershell

Script Block2 detections

Auto-extracted: 2 detections for script block

Privilege2 detections

Auto-extracted: 2 detections for privilege

Remote2 detections

Auto-extracted: 2 detections for remote

C22 detections

Auto-extracted: 2 detections for c2

Lateral2 detections

Auto-extracted: 2 detections for lateral

Persist2 detections

Auto-extracted: 2 detections for persist

Powershell1 detections

Auto-extracted: 1 detections for powershell

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

General Monitoring1 detections

Auto-extracted: 1 detections for general monitoring

Dump1 detections

Auto-extracted: 1 detections for dump

Unusual1 detections

Auto-extracted: 1 detections for unusual

Dump1 detections

Auto-extracted: 1 detections for dump

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Parent Process1 detections

Auto-extracted: 1 detections for parent process

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Api1 detections

Auto-extracted: 1 detections for api

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Network Connection Monitoring1 detections

Auto-extracted: 1 detections for network connection monitoring

Service1 detections

Auto-extracted: 1 detections for service

Service1 detections

Auto-extracted: 1 detections for service

Remote1 detections

Auto-extracted: 1 detections for remote

Service1 detections

Auto-extracted: 1 detections for service

Unusual1 detections

Auto-extracted: 1 detections for unusual

Remote1 detections

Auto-extracted: 1 detections for remote

Parent Process1 detections

Auto-extracted: 1 detections for parent process

Api1 detections

Auto-extracted: 1 detections for api

Remote1 detections

Auto-extracted: 1 detections for remote

DETECTIONS (59)

Account Discovery Command via SYSTEM Account
elasticlow
AWS STS GetCallerIdentity API Called for the First Time
elasticmedium
Check Elevated CMD using whoami
splunk_escu
Chopper Webshell Process Pattern
sigmahigh
Cisco Discovery
sigmalow
Computer Discovery And Export Via Get-ADComputer Cmdlet
sigmamedium
Computer Discovery And Export Via Get-ADComputer Cmdlet - PowerShell
sigmamedium
Discovery Command Output Written to Suspicious File
elasticmedium
Enumerate All Information With Whoami.EXE
sigmamedium
Enumeration Command Spawned via WMIPrvSE
elasticlow
ESXi Network Configuration Discovery Via ESXCLI
sigmamedium
ESXi Storage Information Discovery Via ESXCLI
sigmamedium
ESXi System Information Discovery Via ESXCLI
sigmamedium
ESXi VM List Discovery Via ESXCLI
sigmamedium
ESXi VSAN Information Discovery Via ESXCLI
sigmamedium
Get-ADUser Enumeration Using UserAccountControl Flags
sigmamedium
GetCurrent User with PowerShell
splunk_escu
GetCurrent User with PowerShell Script Block
splunk_escu
Group Membership Reconnaissance Via Whoami.EXE
sigmamedium
HackTool - SharpLdapWhoami Execution
sigmahigh
HackTool - SharpView Execution
sigmahigh
Interactive Privilege Boundary Enumeration Detected via Defend for Containers
elasticlow
Linux Auditd Whoami User Discovery
splunk_escu
Local Accounts Discovery
sigmalow
Possible DCSync Attack
sigmahigh
Potentially Suspicious Process Started via tmux or screen
elasticmedium
PowerShell Suspicious Discovery Related Windows API Functions
elasticlow
Renamed Whoami Execution
sigmacritical
Security Privileges Enumeration Via Whoami.EXE
sigmahigh
SharpHound Recon Sessions
sigmahigh
Sudo Command Enumeration Detected
elasticlow
Suspicious JetBrains TeamCity Child Process
elasticmedium
Suspicious MS Office Child Process
elasticmedium
Suspicious PDF Reader Child Process
elasticlow
Suspicious PowerShell Get Current User
sigmalow
Suspicious React Server Child Process
elastichigh
Suspicious System Commands Executed by Previously Unknown Executable
elasticlow
System Owner or User Discovery - Linux
sigmalow
System User Discovery With Query
splunk_escu
System User Discovery With Whoami
splunk_escu
Unusual Linux User Discovery Activity
elasticlow
Unusual User Privilege Enumeration via id
elasticmedium
User Discovery And Export Via Get-ADUser Cmdlet
sigmamedium
User Discovery And Export Via Get-ADUser Cmdlet - PowerShell
sigmamedium
User Discovery With Env Vars PowerShell
splunk_escu
User Discovery With Env Vars PowerShell Script Block
splunk_escu
Webshell Detection With Command Line Keywords
sigmahigh
Webshell Hacking Activity Patterns
sigmahigh
WhoAmI as Parameter
sigmahigh
Whoami Process Activity
elasticlow
Whoami.EXE Execution Anomaly
sigmamedium
Whoami.EXE Execution From Privileged Process
sigmahigh
Whoami.EXE Execution With Output Option
sigmamedium
Windows Common Abused Cmd Shell Risk Behavior
splunk_escu
Windows System Discovery Using ldap Nslookup
splunk_escu
Windows System Discovery Using Qwinsta
splunk_escu
Windows System Remote Discovery With Query
splunk_escu
Windows System User Discovery Via Quser
splunk_escu
Windows System User Privilege Discovery
splunk_escu