T1564.002
Hidden Users
Adversaries may use hidden users to hide the presence of user accounts they create or modify. On Windows, accounts can be hidden from the login screen by setting a registry value under HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList with a DWORD value of 0 for the username. On macOS, adversaries can set a user's UID below 500 or set a UserShell property to /usr/bin/false to hide them. Threat actors including Dragonfly, Kimsuky, and SMOKEDHAM malware use hidden user accounts for persistent backdoor access.
Microsoft Sentinel / Defender
kusto
DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has "Winlogon\\SpecialAccounts\\UserList"
| where ActionType in ("RegistryValueSet", "RegistryKeyCreated")
| project Timestamp, DeviceName, AccountName, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessFileName, InitiatingProcessCommandLine
| sort by Timestamp desc
union (
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("net.exe", "net1.exe")
| where ProcessCommandLine has "user" and ProcessCommandLine has "/add"
| extend UserAdd = ProcessCommandLine has "/add"
| extend ToAdmins = ProcessCommandLine has_any ("administrators", "admins")
| project Timestamp, DeviceName, AccountName, ProcessCommandLine, InitiatingProcessFileName, UserAdd, ToAdmins
| sort by Timestamp desc
) high severity
high confidence
Data Sources
Process: Process Creation Windows Registry: Windows Registry Key Modification User Account: User Account Creation Microsoft Defender for Endpoint
Required Tables
DeviceRegistryEvents DeviceProcessEvents
False Positives
- Administrators configuring service accounts that should not appear on the login screen for security reasons
- Enterprise management tools (SCCM, MDM solutions) that create management accounts hidden from regular login screens
- Built-in Windows service accounts that are legitimately hidden via the SpecialAccounts mechanism
- IT staff creating dedicated administrator accounts that should not be visible to standard users
Last updated: 2026-04-21 Research depth: deep
References (4)
- https://attack.mitre.org/techniques/T1564/002/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1564.002/T1564.002.md
- https://docs.microsoft.com/en-us/windows/win32/secauthn/winlogon-and-credential-providers
- https://www.mandiant.com/resources/blog/smokedham-backdoor-delivers-cobalt-strike
Unlock Pro Content
Get the full detection package for T1564.002 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance
Related Detections
Parent Technique
T1564Hide ArtifactsRelated Sub-techniques
T1564.001Hidden Files and DirectoriesT1564.003Hidden WindowT1564.004NTFS File AttributesT1564.005Hidden File SystemT1564.006Run Virtual InstanceT1564.007VBA StompingT1564.008Email Hiding RulesT1564.009Resource ForkingT1564.010Process Argument SpoofingT1564.011Ignore Process InterruptsT1564.012File/Path ExclusionsT1564.013Bind MountsT1564.014Extended Attributes