User added to a group and removed

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2024-06-04
Category
Analytics Alert Reference
Order
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

10 Hours

Deduplication Period

1 Day

Required Data

  • Requires one of the following data sources:
    • Windows Event Collector
      OR
    • XDR Agent
  • Requires:
    • eXtended Threat Hunting (XTH)

Detection Modules

Identity Analytics

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

A user was added to an Active Directory group and removed within a short period of time, which may be a sign of compromise.

Attacker's Goals

Elevate permissions and establish persistence.

Investigative actions

  • Verify the activity with the performing user.
  • Confirm that the group addition was not accidental.
  • Check for any suspicious actions performed by the added user.
  • Check for a possible compromise of the initiating user.

Variations

Rare privileged group addition and removal

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

A user was added to an Active Directory privileged group and removed within a short period of time, which may be a sign of compromise.

Attacker's Goals

Elevate permissions and establish persistence.

Investigative actions

  • Verify the activity with the performing user.
  • Confirm that the group addition was not accidental.
  • Check for any suspicious actions performed by the added user.
  • Check for a possible compromise of the initiating user.


User added to a privileged group and removed

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

A user was added to an Active Directory privileged group and removed within a short period of time, which may be a sign of compromise.

Attacker's Goals

Elevate permissions and establish persistence.

Investigative actions

  • Verify the activity with the performing user.
  • Confirm that the group addition was not accidental.
  • Check for any suspicious actions performed by the added user.
  • Check for a possible compromise of the initiating user.