How to tell who created a user account

A local account was created and changed on a Windows 2008 R2 member server by a hacker. I have auditing on. Normally when an account is added or changed, the user account that made the change is listed under Subject / Security  ID.

In this case event logs show:
Security ID:  System
Account name: Servername$
Account Domain:  WindowsDomain
login ID:  0x3ef

I have reason to believe they got the password for the local administrator account but am not 100% sure. Based on the event log, how do I know who created it?
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Sam Simon NasserIT Support ProfessionalCommented:
check the information and steps mentioned here as they might help
ajdratchAuthor Commented:
That link shows security ID nh\peterg. That is easy to see who did it.  Mine shows "System." That does not tell me who did it
Adam BrownSr Solutions ArchitectCommented:
The login ID:  0x3ef is telling you the Hexadecimal version of the unique number tied to the user account's SSID. Run
wmic useraccount get caption,sid

Open in new window

in CMD, look for the user with a 1007 (0x3ef is hexadecimal for 1007) at the end of their SID, and that's the account that was used to create the new account.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
10 Tips to Protect Your Business from Ransomware

Did you know that ransomware is the most widespread, destructive malware in the world today? It accounts for 39% of all security breaches, with ransomware gangsters projected to make $11.5B in profits from online extortion by 2019.

The services that the server has running and exposed to the net,
Local account creation suggests a service that rubs as local system was conpromised.

Point being, the comprise wax do be through the use of the system account,
Hello ThereSystem AdministratorCommented:
What do you want o know? Which account created the user or which person it was?
You will never know which person it was...
And account? If you have one admin account... same as above.
If you haven't enabled auditing... same as above.

I don't think there is anything on the object itself that would tell you that. You most likely would have to enable auditing and then look back at the audit logs to see which user was responsible for creating the object (user account).
ajdratchAuthor Commented:
I was able to find the account using the wmic command. Any idea why the event log entry did not show that username?
Adam BrownSr Solutions ArchitectCommented:
The audit probably showed up like that because the account was created using the command line with a utility that is designed to act as the system account.
ajdratchAuthor Commented:
Thanks a lot for the answer and explanation.
Naveen SharmaCommented:
Here is an another informative article which lets you how to keep track of user creation in Active Directory:
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Windows OS

From novice to tech pro — start learning today.