| ID | Name |
|---|---|
| T1552.001 | Credentials In Files |
| T1552.002 | Credentials in Registry |
| T1552.003 | Shell History |
| T1552.004 | Private Keys |
| T1552.005 | Cloud Instance Metadata API |
| T1552.006 | Group Policy Preferences |
| T1552.007 | Container API |
| T1552.008 | Chat Messages |
Adversaries may attempt to find unsecured credentials in Group Policy Preferences (GPP). GPP are tools that allow administrators to create domain policies with embedded credentials. These policies allow administrators to set local accounts.[1]
These group policies are stored in SYSVOL on a domain controller. This means that any domain user can view the SYSVOL share and decrypt the password (using the AES key that has been made public).[2]
The following tools and scripts can be used to gather and decrypt the password file from Group Policy Preference XML files:
post/windows/gather/credentials/gppOn the SYSVOL share, adversaries may use the following command to enumerate potential GPP XML files: dir /s * .xml
| ID | Name | Description |
|---|---|---|
| G0064 | APT33 |
APT33 has used a variety of publicly available tools like Gpppassword to gather credentials.[4][5] |
| S0194 | PowerSploit |
PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Group Policy Preferences.[6][7] |
| S0692 | SILENTTRINITY |
SILENTTRINITY has a module that can extract cached GPP passwords.[8] |
| G0102 | Wizard Spider |
Wizard Spider has used PowerShell cmdlets |
| ID | Mitigation | Description |
|---|---|---|
| M1015 | Active Directory Configuration |
Remove vulnerable Group Policy Preferences.[10] |
| M1047 | Audit |
Search SYSVOL for any existing GGPs that may contain credentials and remove them.[11] |
| M1051 | Update Software |
Apply patch KB2962486 which prevents credentials from being stored in GPPs.[11][12] |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0381 | Detect Access and Decryption of Group Policy Preference (GPP) Credentials in SYSVOL | AN1075 |
Correlates file enumeration of XML files in the SYSVOL share with suspicious process execution that decodes or reads encrypted credentials embedded in Group Policy Preference files (e.g., Get-GPPPassword.ps1, gpprefdecrypt.py, Metasploit). Detects abnormal access to \DOMAIN\SYSVOL combined with XML file parsing or decryption logic. |