Windows Audit Policy Cleared via Auditpol
The execution of `auditpol.exe` with the `/clear` or `/remove` command-line arguments indicates potential defense evasion by adversaries or Red Teams, aiming to limit data that can be leveraged for detections and audits, potentially leading to full machine compromise or lateral movement.
Attackers, including Red Teams, may attempt to disable or clear Windows audit policies to evade detection and prevent security analysts from identifying malicious activity. This involves using the auditpol.exe utility with the /clear or /remove command-line arguments, effectively erasing existing audit configurations. This action eliminates crucial data points that security teams rely on for detecting and responding to threats. By clearing audit policies, adversaries can operate with a reduced risk of being detected, potentially allowing for prolonged access and further exploitation of compromised systems. The activity is significant as it indicates a deliberate attempt to subvert security measures and gain an advantage within the targeted environment.
Attack Chain
- The attacker gains initial access to the target system (e.g., via compromised credentials or exploiting a vulnerability).
- The attacker escalates privileges to an account with sufficient permissions to modify audit policies.
- The attacker executes
auditpol.exewith the/clearor/removecommand-line argument. - The
auditpol.exeprocess modifies the system’s audit policy settings. - Windows event logging is disabled or significantly reduced due to the cleared audit policy.
- The attacker performs malicious activities without generating standard audit logs.
- The attacker moves laterally within the network to compromise additional systems.
- The attacker achieves their final objective, such as data theft or deploying ransomware.
Impact
Clearing the Windows audit policy can have a severe impact on an organization’s security posture. The lack of audit logs hinders incident response efforts, making it difficult to investigate security incidents and identify compromised systems. Attackers can move laterally, steal sensitive data, or deploy ransomware without triggering standard alerts. This can result in significant financial losses, reputational damage, and regulatory penalties. In some instances, attackers might clear audit policies as a precursor to a larger attack campaign, such as the Solorigate supply chain attack.
Recommendation
- Deploy the Sigma rule
Detect Auditpol Clear Commandto your SIEM to identify instances ofauditpol.exebeing used to clear audit policies. - Enable Sysmon process creation logging (Event ID 1) to capture the execution of
auditpol.exewith command-line arguments. - Monitor Windows Event Log Security events (4688) for process creation events related to
auditpol.exe. - Investigate any instances where
auditpol.exeis executed with the/clearor/removearguments, as this could indicate malicious activity. - Implement strict access controls to limit the number of accounts that can modify audit policies.
- Deploy the Sigma rule
Detect Auditpol Remove Commandto detectauditpol.exeexecutions with/remove.
Detection coverage 2
Detect Auditpol Clear Command
highDetects the execution of auditpol.exe with the /clear command-line argument, indicating a potential attempt to clear audit policies.
Detect Auditpol Remove Command
highDetects the execution of auditpol.exe with the /remove command-line argument, indicating a potential attempt to remove audit policies.
Detection queries are kept inside the platform. Get full rules →