Skip to content
Threat Feed
low advisory

Group Policy Discovery via Microsoft GPResult Utility

Detects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.

Attackers may leverage the gpresult.exe utility, a built-in Windows tool, to gather information about Group Policy Objects (GPOs) within an Active Directory environment. This reconnaissance activity allows adversaries to understand the existing security policies, identify potential misconfigurations, and discover pathways for privilege escalation or lateral movement. The rule focuses on detecting the execution of gpresult.exe with specific command-line arguments (/z, /v, /r, /x) commonly associated with malicious reconnaissance. This behavior is typically observed after an initial compromise, where the attacker is attempting to map out the network and identify valuable targets. This activity matters for defenders as it provides an early indicator of post-compromise activity and can help prevent further damage.

Attack Chain

  1. The attacker gains initial access to a Windows system through methods such as phishing, exploiting vulnerabilities, or using stolen credentials.
  2. The attacker executes gpresult.exe from the command line or through a script.
  3. The attacker uses command-line arguments such as /z, /v, /r, or /x to request detailed information about Group Policy settings.
  4. gpresult.exe queries the Active Directory domain to retrieve GPO information applicable to the user or computer.
  5. The attacker parses the output of gpresult.exe to identify security policies, user rights assignments, and other relevant configurations.
  6. The attacker identifies potential weaknesses in the GPO configuration, such as overly permissive user rights or insecure password policies.
  7. The attacker uses the gathered information to exploit identified weaknesses and escalate privileges or move laterally to other systems within the network.
  8. The attacker achieves their objective, such as data exfiltration, system compromise, or deployment of ransomware.

Impact

Successful exploitation can lead to a comprehensive understanding of the target environment’s security posture, enabling attackers to identify and exploit weaknesses for privilege escalation and lateral movement. While the source does not specify a number of victims or sectors targeted, the impact of a successful attack can range from data breaches and financial losses to reputational damage and disruption of operations. The discovery of misconfigured group policies can open doors for attackers to compromise critical systems and data within the network.

Recommendation

  • Deploy the Sigma rule “Group Policy Discovery via GPResult” to your SIEM to detect the execution of gpresult.exe with suspicious parameters.
  • Enable Windows process creation logging to capture command-line arguments used with gpresult.exe and other executables.
  • Review and harden Group Policy configurations to minimize the risk of exploitation by attackers.
  • Investigate any alerts generated by the Sigma rule “Group Policy Discovery via GPResult” to determine the context and intent of the activity.

Detection coverage 2

Group Policy Discovery via GPResult

low

Detects the execution of gpresult.exe with arguments indicative of group policy discovery.

sigma tactics: discovery techniques: T1615 sources: process_creation, windows

GPResult Executed with Alternate Filename

low

Detects execution of process where original filename is gprslt.exe with arguments indicative of group policy discovery.

sigma tactics: discovery techniques: T1615 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →