ATT&CK coverage › Technique
Account Manipulation T1098
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems. Account manipulation may consist of any action that preserves or modifies adversary access to a compromised account, such as modifying credentials or permission groups. These actions could also include account activity designed to subvert security policies, such as performing iterative password updates to bypass password duration policies and preserve the life of compromised credentials.
Events covered
27 catalog events are tagged with this technique by at least one rule.
Authoring guide
Patterns shared across the 55 rules above: which fields they filter on, what specific values they look for, and what they exclude. Field names are normalized across vendors so Sigma's Image, Elastic's process.name, and Splunk's process_name collapse into one row. Each rule contributes at most once per row.
Fields filtered most (40 distinct)
The fields most rules look at when detecting this technique. The How column shows the operators authors use (eq, wildcard, regex_match, match) and how often each appears. Sample values are concrete examples to start from, not an exhaustive list.
Top indicator values (160 distinct)
Specific (field, operator, value) combinations the rules check for, ranked by how many rules under this technique use each one. The Corpus reach column counts how many rules across the entire catalog (any technique) check the same combination. High numbers point to widely-used indicators that are likely noisy on their own; combine them with another condition for useful signal. Blank means the combination is specific to rules under this technique.
Common exclusions (12 distinct)
Field/operator/value combinations that rules under this technique routinely exclude (top-level not() clauses). These are the false-positive paths the community has learned to filter out. A new rule that ignores the high-count entries here will likely fire on the same noisy paths.
Rules under this technique
Every rule in the catalog tagged with this technique, grouped by vendor. Click a rule title for its full predicates, exclusions, and indicators.
Sigma 16 rules
- A Member Was Added to a Security-Enabled Global Group
- A Member Was Removed From a Security-Enabled Global Group
- A New Trust Was Created To A Domain
- A Security-Enabled Global Group Was Deleted
- Active Directory User Backdoors
- DMSA Link Attributes Modified
- DMSA Service Account Created in Specific OUs - PowerShell
- Enabled User Right in AD to Control User Objects
- New DMSA Service Account Created in Specific OUs
- Password Change on Directory Service Restore Mode (DSRM) Account
- Password Set to Never Expire via WMI
- Powershell LocalAccount Manipulation
- Powerview Add-DomainObjectAcl DCSync AD Extend Right
- User Added To Highly Privileged Group
- User Added to Local Administrator Group
- User Added to Local Administrators Group
Elastic 17 rules
- Account Configured with Never-Expiring Password
- Account Password Reset Remotely
- Active Directory Group Modification by SYSTEM
- AdminSDHolder Backdoor
- AdminSDHolder SDProp Exclusion Added
- Delegated Managed Service Account Modification by an Unusual User
- dMSA Account Creation by an Unusual User
- Kerberos Pre-authentication Disabled for User
- KRBTGT Delegation Backdoor
- Modification of the msPKIAccountCredentials
- Potential Active Directory Replication Account Backdoor
- Potential Privileged Escalation via SamAccountName Spoofing
- Potential Shadow Credentials added to AD Object
- Remote Computer Account DnsHostName Update
- Sensitive Privilege SeEnableDelegationPrivilege assigned to a User
- User account exposed to Kerberoasting
- User Added to Privileged Group in Active Directory
Splunk 13 rules
- Windows AD add Self to Group
- Windows AD DSRM Account Changes
- Windows AD DSRM Password Reset
- Windows AD Privileged Group Modification
- Windows AD Self DACL Assignment
- Windows AD ServicePrincipalName Added To Domain Account
- Windows AD Short Lived Domain Account ServicePrincipalName
- Windows DnsAdmins New Member Added
- Windows Increase in Group or Object Modification Activity
- Windows Increase in User Modification Activity
- Windows Multiple Account Passwords Changed
- Windows Multiple Accounts Deleted
- Windows Multiple Accounts Disabled
Kusto Query Language 9 rules
- AD account with Don't Expire Password
- DEV-0270 New User Creation
- DSRM Account Abuse
- Local Admin Group Changes
- New user created and added to the built-in administrators group
- Sign-ins from IPs that attempt sign-ins to disabled accounts (Uses Authentication Normalization)
- User account added to built in domain local or global group
- User account created and deleted within 10 mins
- User account enabled and disabled within 10 mins