heroui logo

Findstr GPP Passwords

Sigma Rules

View Source
Summary
The detection rule titled "Findstr GPP Passwords" targets the potential exploitation of sensitive information found within Group Policy Preference (GPP) files. Specifically, it seeks to identify instances where the encrypted 'cpassword' value is accessed through Executable files like 'find.exe' or 'findstr.exe'. When such a command is executed, it typically involves searching within the Sysvol directory for XML files that contain the GPP configurations. By reviewing command line inputs that collectively specify criteria such as containing 'cpassword', located within '\sysvol\' directories, and having a file extension of '.xml', this rule effectively flags the use of these search utilities in potentially malicious contexts. The ability to decrypt these cpassword values via tools like gpp-decrypt heightens the risk, making the detection of this behavior critical for maintaining the integrity of account passwords stored in GPP files.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1552.006
Created: 2021-12-27