
Summary
This rule is designed to detect registry modifications relating to the Windows Security Support Provider (SSP) configuration, which may be exploited by adversaries to establish persistence in Windows environments. Utilizing the Elastic Query Language (EQL), it looks for events in the Windows registry, specifically focusing on changes to certain keys associated with security packages. The detection query identifies changes to critical paths under the "HKLM\SYSTEM\ControlSet\Control\Lsa" key while excluding legitimate processes like "msiexec.exe" to reduce false positives. The rule addresses tactics from the MITRE ATT&CK framework, particularly targeting Persistence and Defense Evasion. When triggered, investigators are provided a series of steps to analyze the changes, including inspecting the modifying process, correlating with other security alerts, and considering the context of the modification within the broader environment. The rule guides users to assess the impacts of detected changes and outlines potential responses and remediations in the event of a suspicious registry alteration.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Application Log
- Network Traffic
- Command
ATT&CK Techniques
- T1547
- T1547.005
- T1112
Created: 2020-11-18