Group Policy Discovery via Microsoft GPResult Utility
Detects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.
Attackers may leverage the gpresult.exe utility, a built-in Windows tool, to gather information about Group Policy Objects (GPOs) within an Active Directory environment. This reconnaissance activity allows adversaries to understand the existing security policies, identify potential misconfigurations, and discover pathways for privilege escalation or lateral movement. The rule focuses on detecting the execution of gpresult.exe with specific command-line arguments (/z, /v, /r, /x) commonly associated with malicious reconnaissance. This behavior is typically observed after an initial compromise, where the attacker is attempting to map out the network and identify valuable targets. This activity matters for defenders as it provides an early indicator of post-compromise activity and can help prevent further damage.
Attack Chain
- The attacker gains initial access to a Windows system through methods such as phishing, exploiting vulnerabilities, or using stolen credentials.
- The attacker executes
gpresult.exefrom the command line or through a script. - The attacker uses command-line arguments such as
/z,/v,/r, or/xto request detailed information about Group Policy settings. gpresult.exequeries the Active Directory domain to retrieve GPO information applicable to the user or computer.- The attacker parses the output of
gpresult.exeto identify security policies, user rights assignments, and other relevant configurations. - The attacker identifies potential weaknesses in the GPO configuration, such as overly permissive user rights or insecure password policies.
- The attacker uses the gathered information to exploit identified weaknesses and escalate privileges or move laterally to other systems within the network.
- The attacker achieves their objective, such as data exfiltration, system compromise, or deployment of ransomware.
Impact
Successful exploitation can lead to a comprehensive understanding of the target environment’s security posture, enabling attackers to identify and exploit weaknesses for privilege escalation and lateral movement. While the source does not specify a number of victims or sectors targeted, the impact of a successful attack can range from data breaches and financial losses to reputational damage and disruption of operations. The discovery of misconfigured group policies can open doors for attackers to compromise critical systems and data within the network.
Recommendation
- Deploy the Sigma rule “Group Policy Discovery via GPResult” to your SIEM to detect the execution of
gpresult.exewith suspicious parameters. - Enable Windows process creation logging to capture command-line arguments used with
gpresult.exeand other executables. - Review and harden Group Policy configurations to minimize the risk of exploitation by attackers.
- Investigate any alerts generated by the Sigma rule “Group Policy Discovery via GPResult” to determine the context and intent of the activity.
Detection coverage 2
Group Policy Discovery via GPResult
lowDetects the execution of gpresult.exe with arguments indicative of group policy discovery.
GPResult Executed with Alternate Filename
lowDetects execution of process where original filename is gprslt.exe with arguments indicative of group policy discovery.
Detection queries are kept inside the platform. Get full rules →