| ID | Name |
|---|---|
| T1484.001 | Group Policy Modification |
| T1484.002 | Trust Modification |
Adversaries may modify Group Policy Objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain. Group policy allows for centralized management of user and computer settings in Active Directory (AD). GPOs are containers for group policy settings made up of files stored within a predictable network path \<DOMAIN>\SYSVOL\<DOMAIN>\Policies\.[1][2]
Like other objects in AD, GPOs have access controls associated with them. By default all user accounts in the domain have permission to read GPOs. It is possible to delegate GPO access control permissions, e.g. write access, to specific users or groups in the domain.
Malicious GPO modifications can be used to implement many other malicious behaviors such as Scheduled Task/Job, Disable or Modify Tools, Ingress Tool Transfer, Create Account, Service Execution, and more.[2][3][4][5][6] Since GPOs can control so many user and machine settings in the AD environment, there are a great number of potential attacks that can stem from this GPO abuse.[3]
For example, publicly available scripts such as New-GPOImmediateTask can be leveraged to automate the creation of a malicious Scheduled Task/Job by modifying GPO settings, in this case modifying <GPO_PATH>\Machine\Preferences\ScheduledTasks\ScheduledTasks.xml.[3][4] In some cases an adversary might modify specific user rights like SeEnableDelegationPrivilege, set in <GPO_PATH>\MACHINE\Microsoft\Windows NT\SecEdit\GptTmpl.inf, to achieve a subtle AD backdoor with complete control of the domain because the user account under the adversary's control would then be able to modify GPOs.[7]
| ID | Name | Description |
|---|---|---|
| C0034 | 2022 Ukraine Electric Power Attack |
During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Group Policy Objects (GPOs) to deploy and execute malware.[8] |
| G0096 | APT41 |
APT41 used scheduled tasks created via Group Policy Objects (GPOs) to deploy ransomware.[9] |
| G1021 | Cinnamon Tempest |
Cinnamon Tempest has used Group Policy to deploy batch scripts for ransomware deployment.[10] |
| S0554 | Egregor | |
| S0363 | Empire |
Empire can use |
| S0697 | HermeticWiper |
HermeticWiper has the ability to deploy through an infected system's default domain policy.[14] |
| G0119 | Indrik Spider |
Indrik Spider has used Group Policy Objects to deploy batch scripts.[15][16] |
| S1199 | LockBit 2.0 |
LockBit 2.0 can modify Group Policy to disable Windows Defender and to automatically infect devices in Windows domains.[17][18] |
| S1202 | LockBit 3.0 |
LockBit 3.0 can enable options for propogation through Group Policy Objects.[19] |
| S0688 | Meteor |
Meteor can use group policy to push a scheduled task from the AD to all network machines.[20] |
| S1058 | Prestige |
Prestige has been deployed using the Default Domain Group Policy Object from an Active Directory Domain Controller.[21] |
| S1242 | Qilin |
Qilin has pushed a scheduled task via a Group Policy Object for payload execution.[22][23] |
| C0058 | SharePoint ToolShell Exploitation |
During SharePoint ToolShell Exploitation, threat actors, including Storm-2603, modified group policy to enable ransomware distribution.[24] |
| G1053 | Storm-0501 |
Storm-0501 distributed Group Policy Objects to tamper with security products.[25] |
| ID | Mitigation | Description |
|---|---|---|
| M1047 | Audit |
Identify and correct GPO permissions abuse opportunities (ex: GPO modification privileges) using auditing tools such as BloodHound (version 1.5.1 and later).[26] |
| M1018 | User Account Management |
Consider implementing WMI and security filtering to further tailor which users and computers a GPO will apply to.[3][27][28] |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0305 | Detection of Group Policy Modifications via AD Object Changes and File Activity | AN0854 |
Adversary modifies GPO containers or files under SYSVOL using LDAP, ADSI, PowerShell (e.g., New-GPOImmediateTask) or GUI tools. This includes directory object changes (e.g., gPCFileSysPath), delegation assignments (SeEnableDelegationPrivilege), and SYSVOL file writes (ScheduledTasks.xml, GptTmpl.inf). |