MITRE ATT&CK Technique
Defense Evasion T1134.001
Description

Adversaries may duplicate then impersonate another user's existing token to escalate privileges and bypass access controls. For example, an adversary can duplicate an existing token using `DuplicateToken` or `DuplicateTokenEx`.(Citation: DuplicateToken function) The token can then be used with `ImpersonateLoggedOnUser` to allow the calling thread to impersonate a logged on user's security context, or with `SetThreadToken` to assign the impersonated token to a thread. An adversary may perform [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) when they have a specific, existing process they want to assign the duplicated token to. For example, this may be useful for when the target user has a non-network logon session on the system. When an adversary would instead use a duplicated token to create a new process rather than attaching to an existing process, they can additionally [Create Process with Token](https://attack.mitre.org/techniques/T1134/002) using `CreateProcessWithTokenW` or `CreateProcessAsUserW`. [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) is also distinct from [Make and Impersonate Token](https://attack.mitre.org/techniques/T1134/003) in that it refers to duplicating an existing token, rather than creating a new one.

Supported Platforms
Windows
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2020-02-18T16:39:06.289Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': "Adversaries may duplicate then impersonate another user's "
                'existing token to escalate privileges and bypass access '
                'controls. For example, an adversary can duplicate an existing '
                'token using `DuplicateToken` or `DuplicateTokenEx`.(Citation: '
                'DuplicateToken function) The token can then be used with '
                '`ImpersonateLoggedOnUser` to allow the calling thread to '
                "impersonate a logged on user's security context, or with "
                '`SetThreadToken` to assign the impersonated token to a '
                'thread.\n'
                '\n'
                'An adversary may perform [Token '
                'Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) '
                'when they have a specific, existing process they want to '
                'assign the duplicated token to. For example, this may be '
                'useful for when the target user has a non-network logon '
                'session on the system.\n'
                '\n'
                'When an adversary would instead use a duplicated token to '
                'create a new process rather than attaching to an existing '
                'process, they can additionally [Create Process with '
                'Token](https://attack.mitre.org/techniques/T1134/002) using '
                '`CreateProcessWithTokenW` or `CreateProcessAsUserW`. [Token '
                'Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) '
                'is also distinct from [Make and Impersonate '
                'Token](https://attack.mitre.org/techniques/T1134/003) in that '
                'it refers to duplicating an existing token, rather than '
                'creating a new one.',
 'external_references': [{'external_id': 'T1134.001',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1134/001'},
                         {'description': 'Mathers, B. (2017, March 7). Command '
                                         'line process auditing. Retrieved '
                                         'April 21, 2017.',
                          'source_name': 'Microsoft Command-line Logging',
                          'url': 'https://technet.microsoft.com/en-us/windows-server-docs/identity/ad-ds/manage/component-updates/command-line-process-auditing'},
                         {'description': 'Microsoft. (2021, October 12). '
                                         'DuplicateToken function '
                                         '(securitybaseapi.h). Retrieved '
                                         'January 8, 2024.',
                          'source_name': 'DuplicateToken function',
                          'url': 'https://learn.microsoft.com/en-us/windows/win32/api/securitybaseapi/nf-securitybaseapi-duplicatetoken'}],
 'id': 'attack-pattern--86850eff-2729-40c3-b85e-c4af26da4a2d',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'defense-evasion'},
                       {'kill_chain_name': 'mitre-attack',
                        'phase_name': 'privilege-escalation'}],
 'modified': '2025-10-24T17:49:04.117Z',
 'name': 'Token Impersonation/Theft',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Jonny Johnson'],
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Windows'],
 'x_mitre_version': '1.3'}
Quick Actions
Related Threat Actors (2)
8base
High

FIN8
High