
Summary
The detection rule "Suspicious GPUpdate no Command Line Arguments" focuses on the execution of the Windows command `gpupdate.exe` without any command-line arguments, which is considered atypical behavior. In normal operations, `gpupdate.exe` is invoked with specific flags to update Group Policy settings, suggesting that any execution without these parameters could indicate malicious acts, particularly associated with sophisticated threats such as Cobalt Strike. This rule utilizes telemetry data from Endpoint Detection and Response (EDR) agents that collect process execution logs, namely from Sysmon and Windows Security logs. The analytic is built to monitor the execution context of the `gpupdate.exe` process, aimed at identifying unauthorized activity potentially leading to system compromise or lateral movement. Through precise query syntax leveraging the Splunk platform, the rule can detect and report relevant cases that require further investigation.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1055
Created: 2024-11-13