
Summary
This detection rule identifies changes to Subject Interface Package (SIP) providers within the Windows registry, which are critical for file signature validation in the Windows cryptographic system. Such modifications may indicate attempts to bypass signature checks or inject unauthorized code into essential processes. The rule employs an EQL query to detect registry events suggesting the alteration of specific SIP-related DLL entries, while excluding known benign process alterations to reduce false positives. Key investigation steps involve confirming the legitimacy of the registry changes, tracing the triggering process, correlating events with security logs, and assessing the context of any modifications. A detailed triage process is provided, addressing potential false positives and offering guidance on response and remediation actions to ensure system integrity and security.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Application Log
- Network Traffic
- Malware Repository
ATT&CK Techniques
- T1553
- T1553.003
Created: 2021-01-20