heroui logo

Persistence via WMI Standard Registry Provider

Elastic Detection Rules

View Source
Summary
This EQL (Event Query Language) rule, titled 'Persistence via WMI Standard Registry Provider,' is designed to detect malicious activities where adversaries exploit the Windows Management Instrumentation (WMI) StdRegProv to modify the Windows registry. Such modifications often pertain to persistence mechanisms, allowing an attacker to maintain unauthorized access to infected systems. The rule checks for changes in registry entries associated with common persistence locations when invoked through the WMI standard registry provider (`WmiPrvSe.exe`). If a change is detected in these specific registry paths, the rule signals a potential malicious action, prompting further investigation. The implementation leverages logs from endpoint events and products from Elastic's security suite to monitor registry changes, with a focus on high-risk areas utilized by malware for persistence, such as autorun keys and various startup mechanisms. The investigation involves validating the legitimacy of these alterations, identifying the processes responsible, and assessing the context of the changes to ensure they are not part of normal administrative functions.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Logon Session
ATT&CK Techniques
  • T1543
  • T1543.003
  • T1547
  • T1547.001
  • T1047
Created: 2021-03-15