Skip to content

Latest commit

 

History

History
116 lines (93 loc) · 4.64 KB

detect-5_description.md

File metadata and controls

116 lines (93 loc) · 4.64 KB

DETECT-5

Description

Monitor group membership changes for SMS Admins

Summary

The SMS Admins group is a local security group created on each SMS Provider in the hierarchy. The SMS Admins local security group provides access to the SMS Provider which is a WMI provider that assigns read and write access to Configuration Manager (CM) databases.

PS C:\Users\SCCMADMIN> get-localgroup

Name            Description
----            -----------
SMS Admins      Members have access to the SMS Provider.

The RBAC_Admins table within the site database controls the additions and deletions to the SMS Admins local security group. That means if an account is inserted into the RBAC_Admins table, then the account's SID is added to the SMS Admins local security group on the SMS Provider.

Attackers who relay the site server computer account to the site database server and insert a new account into the RBAC_Admins table will automatically add that user to the SMS Admins local security group.

While defenders cannot set a SACL on the local security group directly, auditing can be enabled for Object Access via auditpol.exe:

auditpol /set /category:"Object Access" /success:enable /failure:enable

Once this audit category is enabled, defenders can monitor the SMS Admins group for modification via Event ID: 4732. When a user is added to the RBAC_Admins table and inherently added to the SMS Admins local security group, the following Event ID: 4732 will display the following information:

A member was added to a security-enabled local group.

Subject:
	Security ID:		SYSTEM
	Account Name:		ATLAS$
	Account Domain:		APERTURE
	Logon ID:		0x3E7

Member:
	Security ID:		APERTURE\TESTSUBJECT1
	Account Name:		-

Group:
	Security ID:		ATLAS\SMS Admins
	Group Name:		SMS Admins
	Group Domain:		ATLAS

Additional Information:
	Privileges:		-

When a user is removed from the RBAC_Admins table in MSSQL database server or the SMS Admins local security group, an Event ID: 4733, is generated:

A member was removed from a security-enabled local group.

Subject:
	Security ID:		SYSTEM
	Account Name:		ATLAS$
	Account Domain:		APERTURE
	Logon ID:		0x3E7

Member:
	Security ID:		APERTURE\TESTSUBJECT1
	Account Name:		-

Group:
	Security ID:		ATLAS\ConfigMgr_CollectedFilesAccess
	Group Name:		ConfigMgr_CollectedFilesAccess
	Group Domain:		ATLAS

Additional Information:
	Privileges:		-

Additionally, telemetry is generated as the MSSQL database server connects and enumerates the SMS Admins group prior to adding the specified user via Event ID: 4799. However, this event is generated frequently by legitmate activiaty and is not directly indicative malicious additions to the local security group without the corresponding Event ID: 4799. The following displays two Event ID: 4799s in relation to the addition of a user to the SMS Admins group:

A security-enabled local group membership was enumerated.

Subject:
	Security ID:		SYSTEM
	Account Name:		ATLAS$
	Account Domain:		APERTURE
	Logon ID:		0x3E7

Group:
	Security ID:		ATLAS\SMS Admins
	Group Name:		SMS Admins
	Group Domain:		ATLAS

Process Information:
	Process ID:		0x244c
	Process Name:		C:\Windows\System32\wbem\WmiPrvSE.exe
A security-enabled local group membership was enumerated.

Subject:
	Security ID:		SYSTEM
	Account Name:		ATLAS$
	Account Domain:		APERTURE
	Logon ID:		0x3E7

Group:
	Security ID:		ATLAS\SMS Admins
	Group Name:		SMS Admins
	Group Domain:		ATLAS

Process Information:
	Process ID:		0xdec
	Process Name:		C:\Program Files\Microsoft Configuration Manager\bin\X64\smsexec.exe

Associated Offensive IDs

References