<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gpo — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/gpo/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/gpo/feed.xml" rel="self" type="application/rss+xml"/><item><title>Scheduled Task Creation via Group Policy Object</title><link>https://feed.craftedsignal.io/briefs/2024-01-gpo-scheduled-task/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gpo-scheduled-task/</guid><description>Detects the creation of scheduled tasks within a Group Policy Object (GPO) by monitoring for the creation of the ScheduledTasks.xml file in the SYSVOL share, potentially indicating malicious persistence.</description><content:encoded><![CDATA[<p>This detection identifies a potential method for establishing persistence on Windows systems by monitoring the creation of scheduled tasks through Group Policy Objects (GPOs). Threat actors may abuse GPOs to deploy malicious scheduled tasks across numerous machines in a domain. When a scheduled task is created via GPO, a ScheduledTasks.xml file, containing its configuration, is created within a specific folder of the SYSVOL share. The detection leverages Windows Event ID 5145 looking for file creation events related to these scheduled tasks. While legitimate GPO scheduled task creation can occur, the relative infrequency of this activity makes it a valuable indicator of potential compromise. This technique allows attackers to maintain access to systems and execute commands at specified intervals, blending in with legitimate administrative activities and making detection more challenging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system or obtains credentials with sufficient privileges to modify GPOs.</li>
<li>The attacker navigates to the Group Policy Management Console (GPMC) on a domain controller or a system with RSAT installed.</li>
<li>The attacker identifies an existing GPO or creates a new GPO to target specific systems or users.</li>
<li>Within the GPO settings, the attacker navigates to the Scheduled Tasks section under Computer Configuration or User Configuration.</li>
<li>The attacker creates a new scheduled task, defining its properties, such as the trigger (time, event, etc.), the action to be performed (execute a program, send an email, etc.), and the user account under which the task will run.</li>
<li>When the GPO is applied to the target systems, the ScheduledTasks.xml file is created in the <code>\\&lt;DOMAIN&gt;\SYSVOL\&lt;DOMAIN&gt;\Policies\{&lt;GPO_GUID&gt;}\Machine\Preferences\ScheduledTasks\ScheduledTasks.xml</code> path.</li>
<li>The target system processes the GPO, creating the scheduled task according to the settings defined in the XML file.</li>
<li>The scheduled task executes at the specified trigger, carrying out the malicious action defined by the attacker (e.g., executing malware, running scripts, or establishing persistence).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistent access to targeted systems. By creating malicious scheduled tasks through GPOs, attackers can execute arbitrary code, deploy malware, or perform other malicious activities at specified intervals. The broad deployment capabilities of GPOs can lead to widespread compromise across the domain, affecting numerous systems and users. This technique can be used to maintain a foothold in the environment, even after initial compromises are remediated. The use of legitimate system administration tools and processes makes detection more difficult, allowing attackers to operate with a lower risk of being detected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows Event Log Security events, specifically Event ID 5145, to capture file access events on network shares.</li>
<li>Deploy the provided Sigma rule <code>Scheduled Task Created in Group Policy Object</code> to identify suspicious ScheduledTasks.xml creation events in the SYSVOL share.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the source computer (<code>Computer</code>) and the targeted file (<code>RelativeTargetName</code>).</li>
<li>Filter known false positives by creating exceptions for approved GPO deployments as mentioned in <code>known_false_positives</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>scheduled-task</category><category>gpo</category><category>persistence</category><category>windows</category></item><item><title>Active Directory Group Policy Deletion Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-ad-gpo-deleted/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ad-gpo-deleted/</guid><description>Detection of Active Directory Group Policy deletion using event ID 5136, indicating potential malicious activity or misconfiguration.</description><content:encoded><![CDATA[<p>This detection identifies when an Active Directory Group Policy Object (GPO) is deleted, potentially indicating malicious activity aimed at disrupting organizational policies or misconfigurations leading to unintended changes. The detection leverages Windows Event Log Security (event ID 5136) and Active Directory monitoring data to correlate the deletion event with the GPO name and the user responsible. It is important to investigate these events promptly, as GPO deletions can have significant impact on the security posture and functionality of a Windows domain. This alert helps defenders identify unauthorized or accidental GPO deletions, enabling rapid response and remediation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an account with sufficient privileges to manage Group Policy Objects (GPOs).</li>
<li>The attacker uses the Group Policy Management Console (GPMC) or PowerShell cmdlets (e.g., <code>Remove-GPO</code>) to initiate the deletion of a targeted GPO.</li>
<li>The deletion event generates Windows Security Event ID 5136, logging details of the object being modified (the GPO). The <code>AttributeLDAPDisplayName</code> is <code>gpLink</code>.</li>
<li>The event includes OperationType codes %%14675 (old value) and %%14674 (new value) showing the before and after states of the GPO.</li>
<li>The event also includes the <code>ObjectDN</code> (Distinguished Name) of the deleted GPO.</li>
<li>Active Directory monitoring (<code>admon</code>) events, specifically updates to <code>Group-Policy-Container</code>, provide the <code>displayName</code> of the GPO based on its <code>distinguishedName</code>.</li>
<li>The <code>gpLink</code> attribute is removed from the affected Organizational Units (OUs) or domains where the GPO was applied, effectively removing the policies associated with that GPO.</li>
<li>The deletion of the GPO can lead to changes in user and computer settings, potentially weakening security controls or disrupting normal operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of GPOs can severely impact an organization&rsquo;s security posture. Deleted GPOs can lead to systems reverting to default configurations, removal of security policies, and potential exposure to vulnerabilities. The scope of impact depends on the criticality and scope of the deleted GPOs, ranging from affecting a small group of users to compromising the entire domain. This can lead to data breaches, system compromise, or disruption of services. Early detection and remediation are crucial to minimize potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure Active Directory auditing is enabled and ingesting Windows Security Event ID 5136 and Active Directory monitoring data. See the referenced Splunk Lantern article for guidance.</li>
<li>Configure the <code>wineventlog_security</code> and <code>admon</code> macros in your Splunk environment to point to the correct indexes as described in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Deploy the provided Sigma rule &ldquo;AD GPO Deleted via Event 5136&rdquo; to detect GPO deletion events. Tune the rule&rsquo;s filter (<code>windows_ad_gpo_deleted_filter</code>) to exclude any known legitimate GPO deletion activities.</li>
<li>Investigate all triggered alerts by examining the source user (<code>src_user</code>) and the deleted GPO (<code>policyName</code>) to determine if the deletion was authorized.</li>
<li>Utilize the provided drilldown searches to investigate the activity of the source user and any associated risk events.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>active-directory</category><category>group-policy</category><category>gpo</category><category>deletion</category><category>t1484.001</category></item></channel></rss>