
Summary
The detection rule titled 'Potential Persistence Via Mpnotify' identifies attempts by attackers to establish persistence by registering a new Session Initiation Protocol (SIP) provider in the Windows registry. Specifically, it focuses on the registry key '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\mpnotify', which is a common target for malicious actors aiming to ensure their presence on an infected system across reboots. The rule employs a detection mechanism that triggers when any changes to the specified registry key are detected, signaling a potential attack vector aimed at maintaining control over the system despite attempts to remediate the compromise. While legitimate applications may also utilize this registry key, the infrequency of SIP provider registrations in typical environments suggests that any such activity warrants further investigation. The rule is intended for Windows systems and operates under a high severity level because of the significant implications tied to successful persistence strategies by adversaries.
Categories
- Windows
Data Sources
- Windows Registry
Created: 2022-07-21