heroui logo

Windows Findstr GPP Discovery

Splunk Security Content

View Source
Summary
The 'Windows Findstr GPP Discovery' analytic rule is designed to identify the execution of the 'findstr' command, which targets unsecured credentials within Group Policy Preferences (GPP). By leveraging data collected from EDR agents, the rule specifically looks for instances where 'findstr.exe' is executed with command-line arguments referencing 'SYSVOL' and 'cpassword'. This behavior is indicative of an actor searching for potentially exploitable embedded credentials, which could lead to unauthorized system access or privilege escalation within a Windows domain environment. The detection search is conducted using Splunk technology, processing various logs to pinpoint command executions that may signify malicious activity involving GPP credential discovery. This rule serves as a preventative measure to alert system administrators about activities that could lead to security breaches, ensuring that they can respond quickly to suspected credential dumping attempts.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1552
  • T1552.006
Created: 2024-11-13