heroui logo

Windows PowerSploit GPP Discovery

Splunk Security Content

View Source
Summary
The detection rule titled 'Windows PowerSploit GPP Discovery' identifies the execution of the PowerShell cmdlet 'Get-GPPPassword', which is utilized to search for unsecured credentials within Group Policy Preferences (GPP). This rule is significant because it focuses on monitoring PowerShell Script Block Logging (EventCode=4104) for specific attempts to access sensitive stored credentials from the SYSVOL directory. If an attacker successfully uses this command, they can potentially escalate their privileges or maneuver laterally across the network by leveraging exposed credentials. Implementing this analytic necessitates enabling PowerShell Script Block Logging on endpoints to capture the relevant execution details reliably.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1552
  • T1552.006
Created: 2024-11-13