
Summary
This detection rule identifies potential abuse of the Local Security Authority (LSA) authentication packages wherein adversaries may escalate privileges or establish persistence by inserting malicious binaries into the Windows registry. The context indicates that changes to the authentication packages registry path, specifically to 'HKLM\SYSTEM\*ControlSet*\Control\Lsa\Authentication Packages', can lead to execution by the SYSTEM user upon loading these authentication packages. The rule specifically looks for registry alterations that are not made by the SYSTEM user (SID "S-1-5-18"), thus highlighting potentially malicious activity. The proactive monitoring of these registry changes is critical for early detection of privilege escalation attempts and maintaining overall security integrity of the system.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Logon Session
- Application Log
- Network Traffic
ATT&CK Techniques
- T1547
- T1547.002
Created: 2021-01-21