| ID | Name |
|---|---|
| T1087.001 | Local Account |
| T1087.002 | Domain Account |
| T1087.003 | Email Account |
| T1087.004 | Cloud Account |
Adversaries may attempt to get a listing of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.
Commands such asnet user andnet localgroup of theNet utility andid andgroups on macOS and Linux can list local users and groups.[1][2][3] On Linux, local users can also be enumerated through the use of the/etc/passwd file. On macOS, thedscl . list /Users command can be used to enumerate local accounts. On ESXi servers, theesxcli system account list command can list local user accounts.[4]
| ID | Name | Description |
|---|---|---|
| G0018 | admin@338 | admin@338 actors used the following commands following exploitation of a machine withLOWBALL malware to enumerate user accounts: |
| S0331 | Agent Tesla | Agent Tesla can collect account information from the victim’s machine.[6] |
| G0006 | APT1 | APT1 used the commands |
| G0022 | APT3 | APT3 has used a tool that can obtain info about local and global group users, power users, and administrators.[7] |
| G0050 | APT32 | APT32 enumerated administrative users using the commands |
| G0096 | APT41 | APT41 used built-in |
| G1044 | APT42 | APT42 has used the PowerShell-based POWERPOST script to collect local account names from the victim machine.[10] |
| S0239 | Bankshot | Bankshot gathers domain and account names/information through process monitoring.[11] |
| S0534 | Bazar | Bazar can identify administrator accounts on an infected host.[12] |
| S0570 | BitPaymer | BitPaymer can enumerate the sessions for each user logged onto the infected host.[13] |
| S0521 | BloodHound | BloodHound can identify users with local administrator rights.[14] |
| G0114 | Chimera | |
| S0244 | Comnie | |
| S0038 | Duqu | The discovery modules used withDuqu can collect information on accounts and permissions.[17] |
| S1159 | DUSTTRAP | |
| S0081 | Elise | Elise executes |
| S0363 | Empire | Empire can acquire local and domain user account information.[20] |
| S0091 | Epic | Epic gathers a list of all user accounts, privilege classes, and time of last logon.[21] |
| G0117 | Fox Kitten | Fox Kitten has accessed ntuser.dat and UserClass.dat on compromised hosts.[22] |
| S0049 | GeminiDuke | GeminiDuke collects information on local user accounts from the victim.[23] |
| S0537 | HyperStack | HyperStack can enumerate all account names on a remote share.[24] |
| S1245 | InvisibleFerret | InvisibleFerret has queried the victim device using Python scripts to obtain the User and Hostname.[25][26] |
| S0260 | InvisiMole | InvisiMole has a command to list account information on the victim’s machine.[27] |
| S0265 | Kazuar | Kazuar gathers information on local groups and members on the victim’s machine.[28] |
| G0004 | Ke3chang | Ke3chang performs account discovery using commands such as |
| S0236 | Kwampirs | Kwampirs collects a list of accounts with the command |
| G0030 | Lotus Blossom | Lotus Blossom has used commands such as |
| G1051 | Medusa Group | Medusa Group has leveraged |
| S1146 | MgBot | MgBot includes modules for identifying local administrator accounts on victim systems.[33] |
| S1015 | Milan | Milan has run |
| S0084 | Mis-Type | Mis-Type may create a file containing the results of the command |
| G1009 | Moses Staff | Moses Staff has collected the administrator username from a compromised host.[36] |
| S0233 | MURKYTOP | MURKYTOP has the capability to retrieve information about users on remote hosts.[37] |
| S0039 | Net | Commands under |
| G0049 | OilRig | OilRig has run |
| C0012 | Operation CuckooBees | DuringOperation CuckooBees, the threat actors used the |
| S0165 | OSInfo | |
| S0598 | P.A.S. Webshell | P.A.S. Webshell can display the /etc/passwd file on a compromised host.[41] |
| S1145 | Pikabot | Pikabot will retrieve the name of the user associated with the thread under which the malware is executing.[42] |
| S0453 | Pony | Pony has used the |
| G0033 | Poseidon Group | Poseidon Group searches for administrator accounts on both the local victim machine and the network.[44] |
| S0378 | PoshC2 | PoshC2 can enumerate local and domain user account information.[45] |
| S0194 | PowerSploit | PowerSploit's |
| S0223 | POWERSTATS | POWERSTATS can retrieve usernames from compromised hosts.[48] |
| S0196 | PUNCHBUGGY | PUNCHBUGGY can gather user names.[49] |
| S0192 | Pupy | Pupy uses PowerView and Pywerview to perform discovery commands such as net user, net group, net local group, etc.[50] |
| S1242 | Qilin | Qilin can list all local users found on a targeted system.[51] |
| S1148 | Raccoon Stealer | Raccoon Stealer checks the privileges of running processes to determine if the running user is equivalent to |
| S0241 | RATANKBA | |
| G1039 | RedCurl | RedCurl has collected information about local accounts.[54][55] |
| S1240 | RedLine Stealer | RedLine Stealer has collected account information from the victim’s machine.[56][57] |
| S0125 | Remsec | |
| S0085 | S-Type | |
| S0063 | SHOTPUT | SHOTPUT has a command to retrieve information about connected users.[59] |
| S0649 | SMOKEDHAM | SMOKEDHAM has used |
| S0516 | SoreFang | SoreFang can collect usernames from the local system via |
| S0603 | Stuxnet | |
| G0027 | Threat Group-3390 | Threat Group-3390 has used |
| S0266 | TrickBot | |
| G0010 | Turla | Turla has used |
| S0452 | USBferry | USBferry can use |
| S0476 | Valak | Valak has the ability to enumerate local admin accounts.[69] |
| G1017 | Volt Typhoon | Volt Typhoon has executed |
| ID | Mitigation | Description |
|---|---|---|
| M1028 | Operating System Configuration | Prevent administrator accounts from being enumerated when an application is elevating through UAC since it can lead to the disclosure of account names. The Registry key is located at |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0303 | Local Account Enumeration Across Host Platforms | AN0846 | Adversary enumeration of local user accounts using Net.exe, WMI, or PowerShell. |
| AN0847 | Enumeration of local users or groups via file access (/etc/passwd) or commands like id, groups. | ||
| AN0848 | Enumeration of macOS local users using dscl, id, dscacheutil, or /etc/passwd access. | ||
| AN0849 | Enumeration of local ESXi accounts using esxcli or vSphere API from unauthorized sessions. |