heroui logo

Windows Security Support Provider Reg Query

Splunk Security Content

View Source
Summary
The 'Windows Security Support Provider Reg Query' detection rule focuses on identifying potentially malicious command-line activities related to querying the Windows registry for Security Support Providers, especially those affecting the Local Security Authority (LSA). The detection rule leverages telemetry from Endpoint Detection and Response (EDR) tools, specifically looking for processes that access LSA-related registry paths such as 'RunAsPPL' and 'LsaCfgFlags'. The significance of this detection lies in the possibility of adversaries utilizing such information to inspect and exploit LSA protections, facilitating credential theft and potentially leading to severe system breaches. Proper monitoring of this behavior is essential as it indicates post-exploitation activities of malicious actors, including the use of tools like winpeas. The analytical rule captures processes by using Sysmon Event ID 1 and Windows Event Log Security Event 4688 data, among others, and outputs relevant metrics and indicators of compromise providing security teams with actionable insights.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1547.005
  • T1547
Created: 2024-11-13