Anomalous Sign-in by New or Dormant Account

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


'Adversaries may steal the credentials of a specific user or service account using credential access techniques or capture credentials earlier in their reconnaissance process through social engineering as a means of gaining persistence." Umbreon, for example, creates valid users to provide access to the system. The query below generates an output of successful sign-in with one or more of the following indications:- - performed by new or recently dormant accounts - where one or more features of t

Attribute Value
Type Hunting Query
Solution UEBA Essentials
ID bb3bb9da-9598-4d1f-af78-7cc2fd413b0b
Tactics Persistence
Techniques T1078
Required Connectors BehaviorAnalytics, AzureActiveDirectory
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
BehaviorAnalytics ?
SigninLogs ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to UEBA Essentials