EXPLORE
← Back to Explore
T1087.001

Local Account

Adversaries may attempt to get a listing of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior. Commands such as <code>net user</code> and <code>net localgroup</code> of the [Net](https://attack.mitre.org/software/S0039) utility and <code>id</code> and <code>groups</code> on macOS and Linux can list local users and groups.(Citation: Mandiant APT1)(Citation: id man page)(Citation: groups man page) On Linux, l...

ESXiLinuxmacOSWindows
32
Detections
3
Sources
18
Threat Actors

BY SOURCE

14splunk_escu12sigma6elastic

PROCEDURES (23)

Process Creation Monitoring4 detections

Auto-extracted: 4 detections for process creation monitoring

Lateral3 detections

Auto-extracted: 3 detections for lateral

Powershell2 detections

Auto-extracted: 2 detections for powershell

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Wmi2 detections

Auto-extracted: 2 detections for wmi

Script Block2 detections

Auto-extracted: 2 detections for script block

Script Block1 detections

Auto-extracted: 1 detections for script block

Powershell1 detections

Auto-extracted: 1 detections for powershell

Lateral1 detections

Auto-extracted: 1 detections for lateral

Persist1 detections

Auto-extracted: 1 detections for persist

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Service1 detections

Auto-extracted: 1 detections for service

Service1 detections

Auto-extracted: 1 detections for service

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Dump1 detections

Auto-extracted: 1 detections for dump

Privilege1 detections

Auto-extracted: 1 detections for privilege

File Monitoring1 detections

Auto-extracted: 1 detections for file monitoring

Persist1 detections

Auto-extracted: 1 detections for persist

Azure1 detections

Auto-extracted: 1 detections for azure

Azure1 detections

Auto-extracted: 1 detections for azure

Lateral1 detections

Auto-extracted: 1 detections for lateral

Privilege1 detections

Auto-extracted: 1 detections for privilege

Powershell1 detections

Auto-extracted: 1 detections for powershell

DETECTIONS (32)

BloodHound Collection Files
sigmahigh
Cisco Collect Data
sigmalow
Detect AzureHound Command-Line Arguments
splunk_escu
Detect AzureHound File Modifications
splunk_escu
Detect SharpHound Command-Line Arguments
splunk_escu
Detect SharpHound File Modifications
splunk_escu
Detect SharpHound Usage
splunk_escu
Enumeration of Administrator Accounts
elasticlow
Enumeration of Users or Groups via Built-in Commands
elasticlow
GetLocalUser with PowerShell
splunk_escu
GetLocalUser with PowerShell Script Block
splunk_escu
GetWmiObject User Account with PowerShell
splunk_escu
GetWmiObject User Account with PowerShell Script Block
splunk_escu
HackTool - Bloodhound/Sharphound Execution
sigmahigh
Local Account Discovery With Wmic
splunk_escu
Local Accounts Discovery
sigmalow
Local System Accounts Discovery - Linux
sigmalow
Local System Accounts Discovery - MacOs
sigmalow
Malicious PowerShell Commandlets - PoshModule
sigmahigh
Malicious PowerShell Commandlets - ProcessCreation
sigmahigh
Malicious PowerShell Commandlets - ScriptBlock
sigmahigh
Mounting Hidden or WebDav Remote Shares
elasticmedium
Network Traffic to Active Directory Web Services Protocol
splunk_escu
Potential Meterpreter Reverse Shell
elastichigh
PowerShell Suspicious Discovery Related Windows API Functions
elasticlow
Suspicious Group And Account Reconnaissance Activity Using Net.EXE
sigmamedium
Suspicious Reconnaissance Activity Using Get-LocalGroupMember Cmdlet
sigmamedium
Suspicious Use of PsLogList
sigmamedium
Unusual User Privilege Enumeration via id
elasticmedium
Windows Account Discovery for None Disable User Account
splunk_escu
Windows SOAPHound Binary Execution
splunk_escu
Windows User Discovery Via Net
splunk_escu