SigmaHQ/rules/windows/builtin/win_susp_local_anon_logon_created.yml
2020-01-30 10:14:18 +01:00

23 lines
733 B
YAML

title: Suspicious Windows ANONYMOUS LOGON Local Account Created
id: 1bbf25b9-8038-4154-a50b-118f2a32be27
status: experimental
description: Detects the creation of suspicious accounts simliar to ANONYMOUS LOGON, such as using additional spaces. Created as an covering detection for exclusion of Logon Type 3 from ANONYMOUS LOGON accounts.
references:
- https://twitter.com/SBousseaden/status/1189469425482829824
author: James Pemberton / @4A616D6573
date: 2019/10/31
tags:
- attack.persistence
- attack.t1136
logsource:
product: windows
service: security
detection:
selection:
EventID: 4720
SAMAccountName: '*ANONYMOUS*LOGON*'
condition: selection
falsepositives:
- Unknown
level: high