Modify Group Policy Settings
Detect malicious GPO modifications can be used to implement many other malicious behaviors.
Sigma rule (View on GitHub)
1title: Modify Group Policy Settings
2id: ada4b0c4-758b-46ac-9033-9004613a150d
3related:
4 - id: b7216a7d-687e-4c8d-82b1-3080b2ad961f
5 type: similar
6status: test
7description: Detect malicious GPO modifications can be used to implement many other malicious behaviors.
8references:
9 - https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1484.001/T1484.001.md
10author: frack113
11date: 2022-08-19
12tags:
13 - attack.defense-evasion
14 - attack.privilege-escalation
15 - attack.t1484.001
16logsource:
17 category: process_creation
18 product: windows
19detection:
20 selection_reg:
21 - Image|endswith: '\reg.exe'
22 - OriginalFileName: 'reg.exe'
23 selection_path:
24 CommandLine|contains: '\SOFTWARE\Policies\Microsoft\Windows\System'
25 selection_key:
26 CommandLine|contains:
27 - GroupPolicyRefreshTimeDC
28 - GroupPolicyRefreshTimeOffsetDC
29 - GroupPolicyRefreshTime
30 - GroupPolicyRefreshTimeOffset
31 - EnableSmartScreen
32 - ShellSmartScreenLevel
33 condition: all of selection_*
34falsepositives:
35 - Legitimate use
36level: medium
References
Related rules
- Modify Group Policy Settings - ScriptBlockLogging
- APT PRIVATELOG Image Load Pattern
- Abuse of Service Permissions to Hide Services Via Set-Service
- Abuse of Service Permissions to Hide Services Via Set-Service - PS
- Account Tampering - Suspicious Failed Logon Reasons