Skip to main content
T1134Privilege Escalationhard difficulty

Access Token Manipulation

Access Token Manipulation (T1134) is a MITRE ATT&CK technique in the Privilege Escalation tactic. SOC analysts detect it by monitoring for XDR, SIEM events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

XDRSIEM

What is Access Token Manipulation?

Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make a running process appear as though it is the child of a different process or belongs to someone other than the user that started the process. When this occurs, the process also takes on the security context associated with the new token. Access token manipulation techniques include token impersonation and theft, create process with token, make and impersonate token, parent PID spoofing, and SID-History injection. Attackers with SeImpersonatePrivilege or SeAssignPrimaryTokenPrivilege can impersonate tokens belonging to SYSTEM or other privileged accounts, effectively escalating their privileges without exploiting a software vulnerability.

Access Token Manipulation is documented as technique T1134 in the MITRE ATT&CK knowledge base under the Privilege Escalation tactic. Detection requires visibility into XDR, SIEM telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify Access Token Manipulation activity. These methods apply across XDR, SIEM environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor for Windows API calls associated with token manipulation including OpenProcessToken, DuplicateToken, ImpersonateLoggedOnUser, and CreateProcessWithTokenW, particularly from processes with no legitimate reason to perform token operations.

  2. 2

    Alert on processes running under a different user context than expected based on their process ancestry, as token manipulation often results in processes appearing to belong to privileged accounts while descending from unprivileged processes.

  3. 3

    Detect SeImpersonatePrivilege and SeAssignPrimaryTokenPrivilege being exercised by service accounts or standard users, as these privileges are not normally used in day-to-day operations and their use warrants investigation.

  4. 4

    Monitor for parent process ID spoofing by correlating reported parent PIDs with actual process ancestry, as attackers use this technique to make malicious processes appear to be children of trusted processes.

  5. 5

    Track unusual service account activity following periods of interactive session establishment, as attackers may use token impersonation to pivot from interactive sessions to service account contexts for lateral movement.

Example Alerts

These realistic alert examples show what Access Token Manipulation looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

CriticalXDR

Token Impersonation via SeImpersonatePrivilege

Metasploit Meterpreter pattern detected: process executing in SYSTEM context via token impersonation using a named pipe exploit. The attack exploited a vulnerable service with SeImpersonatePrivilege to intercept a SYSTEM token through a named pipe connection. This technique, known as Potato attack variants, is frequently used to escalate from service account to SYSTEM privileges.

HighXDR

Process Running Under Unexpected User Context

Calculator.exe process detected running under NT AUTHORITY\SYSTEM context while process tree shows it was spawned by a standard user interactive session. This anomaly indicates token theft or impersonation has occurred. The child processes of this instance are making network connections to external C2 infrastructure, confirming malicious use.

HighXDR

CreateProcessWithToken API Called by Non-Privileged Process

EDR telemetry captured CreateProcessWithTokenW API call from a process running as a standard domain user account. The function was used to spawn a new process with a token belonging to the domain administrator account. This token was obtained by impersonating an active administrator session on the workstation.

Practice Detecting Access Token Manipulation

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Access Token Manipulation. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect Access Token Manipulation?
SOC analysts detect Access Token Manipulation (T1134) by monitoring XDR, SIEM telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor for windows api calls associated with token manipulation including openprocesstoken, duplicatetoken, impersonateloggedonuser, and createproces. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Access Token Manipulation?
Access Token Manipulation can be detected using XDR, SIEM platforms. XDR tools are particularly effective for this technique because they provide visibility into the privilege escalation phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Access Token Manipulation in real-world attacks?
Access Token Manipulation is a well-documented MITRE ATT&CK technique in the Privilege Escalation tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Access Token Manipulation scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Access Token Manipulation for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Privilege Escalation techniques like Access Token Manipulation. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is Privilege Escalation? — SOC Glossary

Privilege escalation is how an attacker gains higher access rights than initially obtained: standard user to administrat…

Read more
Glossary

What is Least Privilege? — SOC Glossary

The principle of least privilege states that users, processes, and systems should receive only the minimum access rights…

Read more
Glossary

What is EDR? — SOC Glossary

Endpoint Detection and Response (EDR) is a security technology that continuously monitors endpoint activity, recording p…

Read more
Glossary

What is Zero Trust? — SOC Glossary

Zero Trust is a security architecture philosophy based on "never trust, always verify," requiring continuous authenticat…

Read more
Career Path

Security Engineer Career Guide — Salary & Skills

Security Engineers build and maintain the infrastructure that SOC analysts depend on. You deploy SIEMs, configure firewa…

Read more
Career Path

Incident Responder Career Guide — Salary & Skills

Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…

Read more
Tool

XDR Training Console — SOCSimulator

The XDR console in SOCSimulator replicates the investigation workflow of platforms like CrowdStrike Falcon, Microsoft De…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Glossary

SOC Glossary — Security Operations Terminology

Complete glossary of Security Operations Center terminology for aspiring SOC analysts.

Read more
Feature

Shift Mode — Real-Time SOC Simulation

Practice alert triage under realistic time pressure with SLA timers and noise injection.

Read more

We use cookies to improve your experience and measure usage. Learn more