heroui logo

Suspicious Files in Default GPO Folder

Sigma Rules

View Source
Summary
This detection rule identifies the unauthorized creation of suspicious executable and dynamic link library (DLL) files within the default Group Policy Object (GPO) folder on Windows systems. This folder is typically used to store GPO-related files for managing settings and configurations across machines in an Active Directory environment. The rule specifically searches for files that match certain criteria indicating potential malicious activity, such as having a target filename that contains the path to the GPO storage folder and ends with either '.exe' or '.dll'. Such files can represent attempts to circumvent security measures or execute unauthorized code as part of an attack that leverages the GPO infrastructure. Given the sensitivity of the GPO folder in an enterprise environment, any creation of unfamiliar executable files within this directory should be considered suspicious and warrant further investigation. The rule has a medium severity level, indicating the need for monitoring but not necessarily immediate action.
Categories
  • Windows
Data Sources
  • File
Created: 2022-04-28