System-Initiated Group Membership Removal
Last updated on:
In this page
Rule name | Rule type | Log sources | MITRE ATT&CK tags | Severity |
|---|---|---|---|---|
System-Initiated Group Membership Removal | Standard | Windows | Persistence: Account Manipulation - Additional Local or Domain Groups (T1098.007) Privilege Escalation: Account Manipulation - Additional Local or Domain Groups (T1098.007) | Attention |
About the rule
Rule Type
Standard
Rule Description
Identifies removal of users from groups by system-level accounts, potentially masking attacker persistence or access changes.
Why this rule?
System-initiated group membership removal is a defensive evasion and anti-forensic technique where attackers running with SYSTEM privileges remove legitimate users from security groups to eliminate witnesses to their activities, ensure exclusive access to compromised resources, hide evidence of unauthorized group membership changes by removing audit trails, or disrupt security operations by removing security team members from administrative groups.
Severity
Attention
Rule journey
Attack chain scenario
Defense Evasion → System Context Execution → Group Membership Removal → Access Modification → Persistence Masking.
Impact
Attackers may remove legitimate users from security groups to mask their activities or maintain exclusive access to compromised resources.
Rule Requirement
Prerequisites
Enable Windows Security Event Logging for Event IDs 4729, 633, 637.
Criteria
Action1: actionname = "Member(s) removed from security group" AND (USERNAME contains "$" AND SECURITYID = "S-1-5-18") select Action1.HOSTNAME,Action1.MESSAGE,Action1.GROUPDOMAIN,Action1.GROUPNAME,Action1.TARGETDOMAIN,Action1.TARGETUSER,Action1.USERNAME,Action1.DOMAIN,Action1.MEMBERGROUPSID,Action1.MEMBERSID,Action1.SECURITYID
Detection
Execution Mode
realtime
Log Sources
Active Directory
MITRE ATT&CK
Persistence: Account Manipulation - Additional Additional Local or Domain Groups (T1098.007) Privilege Escalation: Account Manipulation - Additional Local or Domain Groups (T1098.007)
Future actions
Known False Positives
Scheduled access cleanup tasks, de-provisioning workflows, or security policies removing group memberships automatically.
Next Steps
- Identification: Identify the account removed from the group and the system context performing the action.
- Analysis: Determine if the group membership removal was authorized or part of legitimate de-provisioning.
- Response: Review group membership changes and restore legitimate access if necessary, investigate potential attacker activity.


