T1078.001

Default Accounts

Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those built into an OS (e.g., Guest or Administrator on Windows, root on Linux), preset on network devices/appliances, or created automatically by software integrations (e.g., vpxuser on ESXi when joined to vCenter). Adversaries exploit organizations that fail to disable, rename, or change the passwords of these accounts post-installation.

Microsoft Sentinel / Defender
kusto
let DefaultAccountNames = dynamic([
  "administrator", "guest", "defaultaccount", "defaultuser", "admin",
  "root", "vpxuser", "dcadmin", "sysadmin", "service", "support",
  "user", "test", "demo", "operator", "sa", "netadmin"
]);
let SuspiciousLogonTypes = dynamic([2, 3, 7, 10]);
// Part 1: Windows Security Logon Events for default account usage
let WindowsLogons = SecurityEvent
| where TimeGenerated > ago(24h)
| where EventID in (4624, 4625, 4648)
| where tolower(TargetUserName) in (DefaultAccountNames)
| extend LogonTypeName = case(
    LogonType == 2, "Interactive",
    LogonType == 3, "Network",
    LogonType == 7, "Unlock",
    LogonType == 10, "RemoteInteractive",
    LogonType == 4, "Batch",
    LogonType == 5, "Service",
    tostring(LogonType)
  )
| extend IsFailedLogon = (EventID == 4625)
| extend IsExplicitCred = (EventID == 4648)
| project
    TimeGenerated,
    Computer,
    EventID,
    TargetUserName,
    TargetDomainName,
    LogonType,
    LogonTypeName,
    IpAddress,
    WorkstationName,
    IsFailedLogon,
    IsExplicitCred,
    SubjectUserName,
    SubjectDomainName
| extend AlertSource = "WindowsSecurityLogon";
// Part 2: Defender for Endpoint DeviceLogonEvents
let MdeLogons = DeviceLogonEvents
| where Timestamp > ago(24h)
| where tolower(AccountName) in (DefaultAccountNames)
| extend IsFailedLogon = (ActionType == "LogonFailed")
| project
    TimeGenerated = Timestamp,
    Computer = DeviceName,
    EventID = 0,
    TargetUserName = AccountName,
    TargetDomainName = AccountDomain,
    LogonType,
    LogonTypeName = LogonType,
    IpAddress = RemoteIP,
    WorkstationName = RemoteDeviceName,
    IsFailedLogon,
    IsExplicitCred = false,
    SubjectUserName = InitiatingProcessAccountName,
    SubjectDomainName = InitiatingProcessAccountDomain
| extend AlertSource = "MDE";
// Part 3: Command-line evidence of default account manipulation
let DefaultAccountCmdline = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (
    "net user defaultaccount /active:yes",
    "net user guest /active:yes",
    "net user administrator /active:yes",
    "DefaultAccount",
    "net localgroup administrators guest",
    "net localgroup administrators defaultaccount"
  )
| project
    TimeGenerated = Timestamp,
    Computer = DeviceName,
    EventID = 0,
    TargetUserName = AccountName,
    TargetDomainName = AccountDomain,
    LogonType = 0,
    LogonTypeName = "ProcessExecution",
    IpAddress = "",
    WorkstationName = "",
    IsFailedLogon = false,
    IsExplicitCred = false,
    SubjectUserName = InitiatingProcessAccountName,
    SubjectDomainName = InitiatingProcessAccountDomain
| extend AlertSource = "CmdlineActivity";
WindowsLogons
| union MdeLogons
| union DefaultAccountCmdline
| sort by TimeGenerated desc
high severity medium confidence

Data Sources

Authentication: Authentication Logon Session: Logon Session Creation Process: Process Creation Microsoft Defender for Endpoint Windows Security Event Log

Required Tables

SecurityEvent DeviceLogonEvents DeviceProcessEvents

False Positives

  • Legitimate administrator accounts named 'Administrator' used by IT staff for maintenance tasks in environments without privileged access workstations (PAWs)
  • Automated deployment or imaging systems that authenticate with the built-in Administrator account during machine provisioning (SCCM OSD, MDT)
  • Legacy applications or services running under the built-in Guest or Administrator context that have not been migrated to service accounts
  • Penetration testing or red team exercises explicitly testing default credential scenarios
  • Database administrators legitimately connecting via 'sa' account to SQL Server instances in older environments

Unlock Pro Content

Get the full detection package for T1078.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections