<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sdprop — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sdprop/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 18:40:15 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sdprop/feed.xml" rel="self" type="application/rss+xml"/><item><title>AdminSDHolder SDProp Exclusion Added</title><link>https://feed.craftedsignal.io/briefs/2026-05-adminsdholder-sdprop-exclusion/</link><pubDate>Tue, 12 May 2026 18:40:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-adminsdholder-sdprop-exclusion/</guid><description>Modification of the dsHeuristics attribute to exclude groups from SDProp in Active Directory can allow attackers to maintain persistent access to privileged accounts.</description><content:encoded><![CDATA[<p>The SDProp (Security Descriptor Propagator) process in Active Directory is crucial for maintaining the security of privileged accounts and groups. It compares permissions on protected objects with those defined on the AdminSDHolder object, resetting any discrepancies. Attackers can exploit the dsHeuristics attribute to exclude specific groups from this process, allowing them to manipulate the permissions of these groups without the changes being reverted by SDProp. This can lead to long-term persistence, even if the AdminSDHolder object is properly configured. The modification is identified via Windows Event ID 5136, specifically targeting changes to the dsHeuristics attribute. This attack matters because it allows attackers to maintain unauthorized access to sensitive resources within the Active Directory environment, potentially leading to further compromise and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a privileged account capable of modifying Active Directory attributes.</li>
<li>The attacker identifies the AdminSDHolder object and the groups currently protected by SDProp.</li>
<li>The attacker modifies the dsHeuristics attribute using tools like ADSI Edit or PowerShell to exclude specific privileged groups (e.g., Domain Admins) from SDProp. This involves manipulating the binary representation of the attribute value.</li>
<li>The attacker makes unauthorized changes to the permissions, group memberships, or other security settings of the excluded groups.</li>
<li>SDProp no longer resets the permissions of the excluded groups to match the AdminSDHolder object, effectively preserving the attacker&rsquo;s modifications.</li>
<li>The attacker leverages their persistent access to the compromised privileged accounts and groups to perform lateral movement, escalate privileges, and access sensitive data.</li>
<li>The attacker may create new accounts and add them to the excluded groups, granting them persistent access to the domain.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or complete domain compromise, using the persistently compromised accounts and groups.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to privileged accounts, even after security configurations are supposedly reset by SDProp. This persistence can lead to widespread damage, including complete domain compromise, data exfiltration, and ransomware deployment. The scope of the impact depends on the level of access granted to the compromised accounts. If Domain Admins are compromised, the entire Active Directory forest can be considered at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Changes&rdquo; and monitor Windows Security Event Logs for Event ID 5136 with <code>AttributeLDAPDisplayName : &quot;dSHeuristics&quot;</code> to detect modifications to the dsHeuristics attribute.</li>
<li>Deploy the Sigma rule &ldquo;AdminSDHolder SDProp Exclusion Added&rdquo; to your SIEM to detect suspicious modifications to the dsHeuristics attribute. Tune the rule based on your environment and known directory configuration workflows.</li>
<li>Investigate any detected modifications to the dsHeuristics attribute, focusing on the <code>winlog.event_data.OperationType</code> and <code>winlog.event_data.AttributeValue</code> fields to determine the nature of the change and the groups affected.</li>
<li>Correlate Event ID 5136 with Event ID 4624 (An account was successfully logged on) using <code>winlog.event_data.SubjectLogonId</code> to identify the source of the directory change.</li>
<li>Regularly review and validate the configuration of the AdminSDHolder object and the dsHeuristics attribute to ensure that privileged groups are properly protected by SDProp.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>active-directory</category><category>persistence</category><category>adminsdholder</category><category>sdprop</category></item></channel></rss>