Windows Auditpol ResourceSACL Clearing for Defense Evasion
Adversaries may clear the global object access auditing policy using `auditpol.exe` with the `/resourceSACL` flag and either `/clear` or `/remove` arguments to evade detection by removing audit configurations.
Attackers, including red teams, may attempt to disable or modify security policies to evade detection. The Windows command-line tool auditpol.exe can be abused to clear or remove global object access audit policies. This involves using the /resourceSACL flag combined with the /clear or /remove arguments. By doing so, adversaries aim to limit the data available for security monitoring, making it harder to detect their activities and maintain persistence. The clearing of resourceSACL configurations removes auditing for access to specific objects or resources, potentially allowing attackers to operate without generating audit logs that could expose their actions.
Attack Chain
- Attacker gains initial access to a system via exploitation or credential compromise.
- The attacker elevates privileges to Administrator or SYSTEM to perform actions requiring elevated permissions.
- Attacker executes
auditpol.exewith the/resourceSACLflag and the/clearargument. auditpol.exeprocess modifies the system’s audit policy settings related to global object access.- The targeted
resourceSACLconfigurations are cleared, removing auditing for specific objects or resources. - Attacker validates the removal of audit policies by querying the configuration using
auditpol.exe /get /category:*. - With auditing disabled for those resources, attacker performs malicious actions such as lateral movement, data exfiltration, or installing malware.
Impact
Successful execution of this technique allows attackers to operate with reduced visibility. This can lead to delayed detection of malicious activities, increased dwell time, and greater potential for data breaches or system compromise. This impacts organizations relying on Windows event logging for security monitoring, especially those using global object access auditing to detect unauthorized access to sensitive data or resources.
Recommendation
- Deploy the Sigma rule
Detect Auditpol ResourceSACL Clearingto your SIEM to detect the use ofauditpol.exeto clear the/resourceSACLpolicy. - Enable process creation logging, specifically Windows Event ID 4688 or Sysmon Event ID 1, to capture command-line arguments of
auditpol.exe. - Investigate any instances of
auditpol.exeexecutions with the/resourceSACLflag and/clearor/removearguments, as they could indicate malicious activity. - Implement the provided RBA (Risk Based Alerting) to prioritize alerts based on user and endpoint risk scores associated with the clearing of global object access audit policies.
Detection coverage 2
Detect Auditpol ResourceSACL Clearing
mediumDetects the use of auditpol.exe to clear the resourceSACL policy, which can be used to evade detection.
Detect Auditpol Execution with Suspicious Arguments
infoDetects execution of auditpol.exe with potentially malicious arguments.
Detection queries are kept inside the platform. Get full rules →