Skip to content

Hide Navigation Hide TOC

New DMSA Service Account Created in Specific OUs (0ea8db81-2ff6-4525-9448-33bbe7effc13)

Detects the creation of a dMSASvc account using the New-ADServiceAccount cmdlet in certain OUs. The fact that the Cmdlet is used to create a dMSASvc account in a specific OU is highly suspicious. It is a pattern trying to exploit the BadSuccessor privilege escalation vulnerability in Windows Server 2025. On top of that, if the user that is creating the dMSASvc account is not a legitimate administrator or does not have the necessary permissions, it is a strong signal of an attempted or successful abuse of the BaDSuccessor vulnerability for privilege escalation within the Windows Server 2025 Active Directory environment.

Cluster A Galaxy A Cluster B Galaxy B Level
Domain Accounts - T1078.002 (c3d4bdd9-2cfe-4a80-9d0c-07a29ecdce8f) Attack Pattern New DMSA Service Account Created in Specific OUs (0ea8db81-2ff6-4525-9448-33bbe7effc13) Sigma-Rules 1
Account Manipulation - T1098 (a10641f4-87b4-45a3-a906-92a149cb2c27) Attack Pattern New DMSA Service Account Created in Specific OUs (0ea8db81-2ff6-4525-9448-33bbe7effc13) Sigma-Rules 1
Domain Accounts - T1078.002 (c3d4bdd9-2cfe-4a80-9d0c-07a29ecdce8f) Attack Pattern Valid Accounts - T1078 (b17a1a56-e99c-403c-8948-561df0cffe81) Attack Pattern 2