Files
blue-team-tools/rules/windows/powershell/powershell_script/powershell_winlogon_helper_dll.yml
T

29 lines
1.3 KiB
YAML
Raw Normal View History

2019-11-12 23:05:36 +01:00
title: Winlogon Helper DLL
2019-11-12 23:12:27 +01:00
id: 851c506b-6b7c-4ce2-8802-c703009d03c0
2019-11-12 23:05:36 +01:00
status: experimental
2020-06-16 14:46:08 -06:00
description: Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete. Registry entries in HKLM\Software[Wow6432Node]Microsoft\Windows NT\CurrentVersion\Winlogon\ and HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ are used to manage additional helper programs and functionalities that support Winlogon. Malicious modifications to these Registry keys may cause Winlogon to load and execute malicious DLLs and/or executables.
2019-11-12 23:05:36 +01:00
author: Timur Zinniatullin, oscd.community
date: 2019/10/21
2021-10-16 08:18:49 +02:00
modified: 2021/10/16
2019-11-12 23:05:36 +01:00
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md
2019-11-12 23:05:36 +01:00
logsource:
product: windows
2021-10-16 08:18:49 +02:00
category: ps_script
2021-08-21 09:50:59 +02:00
definition: Script block logging must be enabled
2019-11-12 23:05:36 +01:00
detection:
selection:
2020-12-01 02:23:02 +01:00
ScriptBlockText|contains: 'CurrentVersion\Winlogon'
selection2:
ScriptBlockText|contains:
- 'Set-ItemProperty'
- 'New-Item'
condition: selection and selection2
2019-11-12 23:05:36 +01:00
falsepositives:
- Unknown
level: medium
tags:
- attack.persistence
2020-06-16 14:46:08 -06:00
- attack.t1547.004
- attack.t1004 # an old one