2019-01-18 19:05:21 +00:00
title : Security Support Provider (SSP) added to LSA configuration
2019-11-12 22:12:27 +00:00
id : eeb30123-9fbd-4ee8-aaa0-2e545bbed6dc
2019-02-05 21:28:06 +00:00
status : experimental
2019-11-12 22:12:27 +00:00
description : Detects the addition of a SSP to the registry. Upon a reboot or API call, SSP DLLs gain access to encrypted and plaintext passwords stored in Windows.
2019-01-18 19:05:21 +00:00
references :
- https://attack.mitre.org/techniques/T1101/
- https://powersploit.readthedocs.io/en/latest/Persistence/Install-SSP/
tags :
- attack.persistence
- attack.t1011
2019-02-05 21:28:06 +00:00
author : iwillkeepwatch
2019-01-18 19:05:21 +00:00
date : 2019 /01/18
logsource :
product : windows
service : sysmon
detection :
selection_registry :
EventID : 13
TargetObject :
- 'HKLM\System\CurrentControlSet\Control\Lsa\Security Packages'
- 'HKLM\System\CurrentControlSet\Control\Lsa\OSConfig\Security Packages'
exclusion_images :
- Image : C:\Windows\system32\msiexec.exe
- Image : C:\Windows\syswow64\MsiExec.exe
condition : selection_registry and not exclusion_images
falsepositives :
- Unlikely
level : critical