Windows Audit Policy Security Descriptor Tampering via Auditpol
Detection of `auditpol.exe` execution with arguments to modify the audit policy security descriptor, indicative of defense evasion by adversaries aiming to limit audit logging.
This brief focuses on the misuse of auditpol.exe to tamper with Windows audit policy security descriptors. Attackers, including red teams, may leverage this technique to evade defenses by limiting the scope and effectiveness of audit logging. By modifying the security descriptor of the audit policy, adversaries can restrict access and prevent certain users or applications from reverting unauthorized changes. This activity is typically executed after disabling specific policy categories from logging. The modification aims to weaken security monitoring, thereby facilitating further malicious operations without raising immediate alarms. The successful execution of this tampering could lead to full machine compromise or lateral movement, as attackers operate with reduced visibility.
Attack Chain
- Initial access is achieved through existing system privileges or exploitation of a vulnerability.
- The attacker disables specific audit policy categories using
auditpol.exeto reduce the volume of logged events. auditpol.exeis executed with the/setflag and/sdparameter to modify the security descriptor of the audit policy.- The modified security descriptor restricts access to the audit policy, preventing certain users or applications from reverting the changes.
- The attacker leverages the reduced audit visibility to perform reconnaissance activities, such as discovering credentials or mapping the network.
- Malicious tools, like custom scripts or malware, are deployed and executed without triggering audit-based alerts.
- Lateral movement is initiated to compromise other systems within the network, expanding the attacker’s footprint.
- The attacker achieves their final objective, which may include data exfiltration, ransomware deployment, or long-term persistence.
Impact
Successful tampering of the audit policy security descriptor can lead to a significant reduction in security visibility. This can allow attackers to operate undetected for extended periods, increasing the likelihood of successful data breaches, ransomware attacks, or other malicious activities. While the exact number of victims and sectors targeted is not specified, the potential impact is widespread across any organization relying on Windows audit logging for security monitoring. A successful attack can result in substantial financial losses, reputational damage, and regulatory penalties.
Recommendation
- Deploy the Sigma rule
Auditpol Security Descriptor Modificationto your SIEM to detect the use ofauditpol.exewith arguments indicative of security descriptor tampering. - Enable Sysmon Event ID 1 process creation logging to provide the necessary data for the Sigma rule to function effectively.
- Investigate any instances of
auditpol.exeexecution with the/setand/sdflags, as these are rarely legitimate in normal system administration. - Regularly review and validate the integrity of Windows audit policies to ensure they have not been tampered with.
- Implement strict access controls for
auditpol.exeto prevent unauthorized users from modifying audit policies. - Use a host-based intrusion detection system (HIDS) to monitor for unauthorized modifications to the audit policy security descriptor.
Detection coverage 2
Auditpol Security Descriptor Modification
highDetects the execution of auditpol.exe with arguments to modify security descriptors, indicative of defense evasion.
Auditpol Disable Audit Category
mediumDetects the execution of auditpol.exe with arguments to disable logging of an audit category.
Detection queries are kept inside the platform. Get full rules →