T1564.002

Hidden Users

Adversaries may use hidden users to hide the presence of user accounts they create or modify. On Windows, accounts can be hidden from the login screen by setting a registry value under HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList with a DWORD value of 0 for the username. On macOS, adversaries can set a user's UID below 500 or set a UserShell property to /usr/bin/false to hide them. Threat actors including Dragonfly, Kimsuky, and SMOKEDHAM malware use hidden user accounts for persistent backdoor access.

Microsoft Sentinel / Defender
kusto
DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has "Winlogon\\SpecialAccounts\\UserList"
| where ActionType in ("RegistryValueSet", "RegistryKeyCreated")
| project Timestamp, DeviceName, AccountName, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessFileName, InitiatingProcessCommandLine
| sort by Timestamp desc
union (
  DeviceProcessEvents
  | where Timestamp > ago(24h)
  | where FileName in~ ("net.exe", "net1.exe")
  | where ProcessCommandLine has "user" and ProcessCommandLine has "/add"
  | extend UserAdd = ProcessCommandLine has "/add"
  | extend ToAdmins = ProcessCommandLine has_any ("administrators", "admins")
  | project Timestamp, DeviceName, AccountName, ProcessCommandLine, InitiatingProcessFileName, UserAdd, ToAdmins
  | sort by Timestamp desc
)
high severity high confidence

Data Sources

Process: Process Creation Windows Registry: Windows Registry Key Modification User Account: User Account Creation Microsoft Defender for Endpoint

Required Tables

DeviceRegistryEvents DeviceProcessEvents

False Positives

  • Administrators configuring service accounts that should not appear on the login screen for security reasons
  • Enterprise management tools (SCCM, MDM solutions) that create management accounts hidden from regular login screens
  • Built-in Windows service accounts that are legitimately hidden via the SpecialAccounts mechanism
  • IT staff creating dedicated administrator accounts that should not be visible to standard users

Unlock Pro Content

Get the full detection package for T1564.002 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections