ID | Name |
---|---|
T1087.001 | Local Account |
T1087.002 | Domain Account |
T1087.003 | Email Account |
T1087.004 | Cloud Account |
Adversaries may attempt to get a listing of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.
Commands such as net user
and net localgroup
of the Net utility and id
and groups
on macOS and Linux can list local users and groups.[1][2][3] On Linux, local users can also be enumerated through the use of the /etc/passwd
file. On macOS the dscl . list /Users
command can be used to enumerate local accounts.
ID | Name | Description |
---|---|---|
G0018 | admin@338 |
admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: |
S0331 | Agent Tesla |
Agent Tesla can collect account information from the victim’s machine.[5] |
G0006 | APT1 |
APT1 used the commands |
G0022 | APT3 |
APT3 has used a tool that can obtain info about local and global group users, power users, and administrators.[6] |
G0050 | APT32 |
APT32 enumerated administrative users using the commands |
G0096 | APT41 |
APT41 used built-in |
S0239 | Bankshot |
Bankshot gathers domain and account names/information through process monitoring.[9] |
S0534 | Bazar |
Bazar can identify administrator accounts on an infected host.[10] |
S0570 | BitPaymer |
BitPaymer can enumerate the sessions for each user logged onto the infected host.[11] |
S0521 | BloodHound |
BloodHound can identify users with local administrator rights.[12] |
G0114 | Chimera | |
S0244 | Comnie | |
S0038 | Duqu |
The discovery modules used with Duqu can collect information on accounts and permissions.[15] |
S1159 | DUSTTRAP | |
S0081 | Elise |
Elise executes |
S0363 | Empire |
Empire can acquire local and domain user account information.[18] |
S0091 | Epic |
Epic gathers a list of all user accounts, privilege classes, and time of last logon.[19] |
G0117 | Fox Kitten |
Fox Kitten has accessed ntuser.dat and UserClass.dat on compromised hosts.[20] |
S0049 | GeminiDuke |
GeminiDuke collects information on local user accounts from the victim.[21] |
S0537 | HyperStack |
HyperStack can enumerate all account names on a remote share.[22] |
S0260 | InvisiMole |
InvisiMole has a command to list account information on the victim’s machine.[23] |
S0265 | Kazuar |
Kazuar gathers information on local groups and members on the victim’s machine.[24] |
G0004 | Ke3chang |
Ke3chang performs account discovery using commands such as |
S0236 | Kwampirs |
Kwampirs collects a list of accounts with the command |
S1146 | MgBot |
MgBot includes modules for identifying local administrator accounts on victim systems.[27] |
S1015 | Milan |
Milan has run |
S0084 | Mis-Type |
Mis-Type may create a file containing the results of the command |
G1009 | Moses Staff |
Moses Staff has collected the administrator username from a compromised host.[30] |
S0233 | MURKYTOP |
MURKYTOP has the capability to retrieve information about users on remote hosts.[31] |
S0039 | Net |
Commands under |
G0049 | OilRig |
OilRig has run |
C0012 | Operation CuckooBees |
During Operation CuckooBees, the threat actors used the |
S0165 | OSInfo | |
S0598 | P.A.S. Webshell |
P.A.S. Webshell can display the /etc/passwd file on a compromised host.[35] |
S1145 | Pikabot |
Pikabot will retrieve the name of the user associated with the thread under which the malware is executing.[36] |
S0453 | Pony |
Pony has used the |
G0033 | Poseidon Group |
Poseidon Group searches for administrator accounts on both the local victim machine and the network.[38] |
S0378 | PoshC2 |
PoshC2 can enumerate local and domain user account information.[39] |
S0194 | PowerSploit |
PowerSploit's |
S0223 | POWERSTATS |
POWERSTATS can retrieve usernames from compromised hosts.[42] |
S0196 | PUNCHBUGGY |
PUNCHBUGGY can gather user names.[43] |
S0192 | Pupy |
Pupy uses PowerView and Pywerview to perform discovery commands such as net user, net group, net local group, etc.[44] |
S1148 | Raccoon Stealer |
Raccoon Stealer checks the privileges of running processes to determine if the running user is equivalent to |
S0241 | RATANKBA | |
G1039 | RedCurl |
RedCurl has collected information about local accounts.[47][48] |
S0125 | Remsec | |
S0085 | S-Type | |
S0063 | SHOTPUT |
SHOTPUT has a command to retrieve information about connected users.[50] |
S0649 | SMOKEDHAM |
SMOKEDHAM has used |
S0516 | SoreFang |
SoreFang can collect usernames from the local system via |
S0603 | Stuxnet | |
G0027 | Threat Group-3390 |
Threat Group-3390 has used |
S0266 | TrickBot | |
G0010 | Turla |
Turla has used |
S0452 | USBferry |
USBferry can use |
S0476 | Valak |
Valak has the ability to enumerate local admin accounts.[60] |
G1017 | Volt Typhoon |
Volt Typhoon has executed |
ID | Mitigation | Description |
---|---|---|
M1028 | Operating System Configuration |
Prevent administrator accounts from being enumerated when an application is elevating through UAC since it can lead to the disclosure of account names. The Registry key is located at |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor for execution of commands and arguments associated with enumeration or information gathering of local accounts and groups such as System and network discovery techniques normally occur throughout an operation as an adversary learns the environment, and also to an extent in normal network operations. Therefore discovery data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. |
DS0022 | File | File Access |
Monitor access to file resources that contain local accounts and groups information such as If access requires high privileges, look for non-admin objects (such as users or processes) attempting to access restricted file resources. |
DS0036 | Group | Group Enumeration |
Monitor for logging that may suggest a list of available groups and/or their associated settings has been extracted, ex. Windows EID 4798 and 4799. |
DS0009 | Process | OS API Execution |
Monitor for API calls (such as |
Process Creation |
Monitor for processes that can be used to enumerate user accounts and groups such as Note: Event IDs are for Sysmon (Event ID 1 - process creation) and Windows Security Log (Event ID 4688 - a new process has been created). - For Linux, auditing frameworks such as the Linux Auditing System (auditd) can be used to alert on the enumeration/reading of files that store local users, including Analytic 1 - Net Discovery Commands
|