Windows suspicious computer name containing Samtheadmin

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects systems or accounts named “samtheadmin” that indicate compromise through unauthorized privilege escalation and persistence.

Strategy

This rule monitors Windows events for the specific string patterns “samtheadmin” or “SAMTHEADMIN” in both @Event.EventData.Data.SamAccountName and @Event.EventData.Data.TargetUserName fields. These naming patterns are associated with targeted attack campaigns where adversaries create administrative accounts or rename systems during post-exploitation activities.

The “samtheadmin” naming convention is a strong indicator of compromise as legitimate administrators avoid using such obvious administrative naming conventions that draw attention to privileged accounts.

Triage & Response

  • Verify the suspicious account or computer name existence on {{host}}.
  • Determine when the account was created or system was renamed.
  • Review authentication logs for activity involving the suspicious account.
  • Examine assigned privileges and group memberships for privilege escalation.
  • Search for concurrent suspicious account creation activities.
  • Investigate lateral movement attempts from the compromised system.
  • Reset all administrative credentials that may have been compromised.
  • Isolate affected systems from the network.