forked from SigmaHQ/sigma
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge PR SigmaHQ#5001 from @joshnck - Add `Startup/Logon Script Added…
… to Group Policy Object` new: Startup/Logon Script Added to Group Policy Object --------- Co-authored-by: nasbench <[email protected]>
- Loading branch information
Showing
1 changed file
with
41 additions
and
0 deletions.
There are no files selected for viewing
41 changes: 41 additions & 0 deletions
41
...s/windows/builtin/security/win_security_susp_group_policy_startup_script_added_to_gpo.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,41 @@ | ||
title: Startup/Logon Script Added to Group Policy Object | ||
id: 123e4e6d-b123-48f8-b261-7214938acaf0 | ||
status: experimental | ||
description: | | ||
Detects the modification of Group Policy Objects (GPO) to add a startup/logon script to users or computer objects. | ||
references: | ||
- https://www.elastic.co/guide/en/security/current/startup-logon-script-added-to-group-policy-object.html | ||
author: Elastic, Josh Nickels, Marius Rothenbücher | ||
date: 2024-09-06 | ||
tags: | ||
- attack.privilege-escalation | ||
- attack.t1484.001 | ||
- attack.t1547 | ||
logsource: | ||
product: windows | ||
service: security | ||
definition: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure' | ||
detection: | ||
selection_eventid: | ||
EventID: | ||
- 5136 | ||
- 5145 | ||
selection_attributes_main: | ||
AttributeLDAPDisplayName: | ||
- 'gPCMachineExtensionNames' | ||
- 'gPCUserExtensionNames' | ||
AttributeValue|contains: '42B5FAAE-6536-11D2-AE5A-0000F87571E3' | ||
selection_attributes_optional: | ||
AttributeValue|contains: | ||
- '40B6664F-4972-11D1-A7CA-0000F87571E3' | ||
- '40B66650-4972-11D1-A7CA-0000F87571E3' | ||
selection_share: | ||
ShareName|endswith: '\SYSVOL' | ||
RelativeTargetName|endswith: | ||
- '\scripts.ini' | ||
- '\psscripts.ini' | ||
AccessList|contains: '%%4417' | ||
condition: selection_eventid and (all of selection_attributes_* or selection_share) | ||
falsepositives: | ||
- Legitimate execution by system administrators. | ||
level: medium |