Create Account
Adversaries may create an account to maintain access to victim systems.(Citation: Symantec WastedLocker June 2020) With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system. Accounts may be created on the local system or within a domain or cloud tenant. In cloud environments, adversaries may create accounts that only have access to specific services, which can r...
BY SOURCE
PROCEDURES (21)
Auto-extracted: 4 detections for persist
Auto-extracted: 3 detections for persist
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for service
Auto-extracted: 2 detections for bypass
Auto-extracted: 2 detections for credential
Auto-extracted: 2 detections for privilege
Auto-extracted: 1 detections for token
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for cloud monitoring
Auto-extracted: 1 detections for aws
Auto-extracted: 1 detections for token
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for registry monitoring
Auto-extracted: 1 detections for cloud
Auto-extracted: 1 detections for bypass