Skip to content

DET0873 Detection of Establish Accounts

Item Value
ID DET0873
Version 1.0
Created 21 October 2025
Last Modified 21 October 2025

Technique Detected: T1585 (Establish Accounts)

Analytics

PRE

AN2005

Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). Consider monitoring social media activity related to your organization. Suspicious activity may include personas claiming to work for your organization or recently created/modified accounts making numerous connection requests to accounts affiliated with your organization. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access (ex: Phishing).

Log Sources
Data Component Name Channel
Network Traffic Content (DC0085) Network Traffic None
Social Media (DC0052) Persona None
Mutable Elements
Field Description