Detection rules › Sigma

Group Policy Abuse for Privilege Addition

Severity
medium
Author
Elastic, Josh Nickels, Marius Rothenbücher
Source
upstream

Detects the first occurrence of a modification to Group Policy Object Attributes to add privileges to user accounts or use them to add users as local admins.

MITRE ATT&CK coverage

TacticTechniques
Privilege EscalationT1484.001 Domain or Tenant Policy Modification: Group Policy Modification
Defense EvasionT1484.001 Domain or Tenant Policy Modification: Group Policy Modification

Event coverage

ProviderEvent IDTitle
Security-Auditing5136A directory service object was modified.

Stages and Predicates

Stage 1: selection

or:
AttributeValue|contains: '803E14A0-B4FB-11D0-A0D0-00A0C90F574B'
AttributeValue|contains: '827D319E-6EAC-11D2-A4EA-00C04F79F83A'
AttributeLDAPDisplayName: gPCMachineExtensionNames

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
AttributeLDAPDisplayNameeq
  • gPCMachineExtensionNames corpus 4 (sigma 3, splunk 1)
AttributeValuematch
  • 803E14A0-B4FB-11D0-A0D0-00A0C90F574B
  • 827D319E-6EAC-11D2-A4EA-00C04F79F83A