Modify Group Policy Settings

Detect malicious GPO modifications can be used to implement many other malicious behaviors.

Sigma rule (View on GitHub)

 1title: Modify Group Policy Settings
 2id: ada4b0c4-758b-46ac-9033-9004613a150d
 3related:
 4    - id: b7216a7d-687e-4c8d-82b1-3080b2ad961f
 5      type: similar
 6status: test
 7description: Detect malicious GPO modifications can be used to implement many other malicious behaviors.
 8references:
 9    - https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1484.001/T1484.001.md
10author: frack113
11date: 2022/08/19
12tags:
13    - attack.defense_evasion
14    - attack.privilege_escalation
15    - attack.t1484.001
16logsource:
17    category: process_creation
18    product: windows
19detection:
20    selection_reg:
21        - Image|endswith: '\reg.exe'
22        - OriginalFileName: 'reg.exe'
23    selection_path:
24        CommandLine|contains: '\SOFTWARE\Policies\Microsoft\Windows\System'
25    selection_key:
26        CommandLine|contains:
27            - GroupPolicyRefreshTimeDC
28            - GroupPolicyRefreshTimeOffsetDC
29            - GroupPolicyRefreshTime
30            - GroupPolicyRefreshTimeOffset
31            - EnableSmartScreen
32            - ShellSmartScreenLevel
33    condition: all of selection_*
34falsepositives:
35    - Legitimate use
36level: medium

References

Related rules

to-top