Masquerade Account Name
Adversaries may match or approximate the names of legitimate accounts to make newly created ones appear benign. This will typically occur during Create Account, although accounts may also be renamed at a later date. This may also coincide with Account Access Removal if the actor first deletes an account before re-creating one with the same name. Often, adversaries will attempt to masquerade as service accounts, such as those associated with legitimate software, data backups, or container cluster management. They may also give accounts generic, trustworthy names, such as 'admin', 'help', or 'root.' Sometimes adversaries may model account names off of those already existing in the system, as a follow-on behavior to Account Discovery.
let SuspiciousAccountNames = dynamic([
"admin", "administrator", "help", "helpdesk", "HelpAssistant",
"support", "supportaccount", "svc_backup", "svc_sql", "svc_update",
"backup", "backupadmin", "DefaultAccount", "default", "root",
"service", "system", "sysadmin", "dbadmin", "sqladmin",
"guest", "test", "temp", "maintenance", "monitoring"
]);
let NewAccounts = SecurityEvent
| where TimeGenerated > ago(24h)
| where EventID == 4720
| extend NewAccountName = tostring(TargetUserName)
| extend CreatorAccount = tostring(SubjectUserName)
| extend NewAccountNameLower = tolower(NewAccountName);
NewAccounts
| where NewAccountNameLower has_any (SuspiciousAccountNames)
or NewAccountNameLower matches regex @"^(svc_|svc-|service|backup|admin|help|support|default|sys)"
or NewAccountNameLower matches regex @"(admin|service|backup|help|support)$"
| extend NameContainsUnderscore = NewAccountName contains "_"
| extend NameContainsNumbers = NewAccountName matches regex @"[0-9]{4,}"
| project TimeGenerated, Computer, EventID, NewAccountName, CreatorAccount,
NewAccountNameLower, NameContainsUnderscore, NameContainsNumbers
| sort by TimeGenerated desc Data Sources
Required Tables
False Positives
- IT administrators legitimately creating service accounts with conventional naming patterns (svc_*, backup*, admin*) during planned software deployments or infrastructure changes
- Automated provisioning systems (SCCM, Ansible, Terraform) creating accounts with templated names during scheduled infrastructure deployments
- Password reset workflows that delete and re-create accounts with the same name as part of account recovery procedures
- Helpdesk or support team accounts legitimately named 'help', 'helpdesk', or 'support' in organizations that use these conventions
References (7)
- https://attack.mitre.org/techniques/T1036/010/
- https://www.elastic.co/security-labs/cuba-ransomware-campaign-analysis
- https://www.invictus-ir.com/news/ransomware-in-the-cloud
- https://www.huntress.com/blog/moveit-transfer-critical-vulnerability-rapid-response
- https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters
- https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4720
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1136.001/T1136.001.md
Unlock Pro Content
Get the full detection package for T1036.010 including response playbook, investigation guide, and atomic red team tests.