Forest Blizzard APT - Custom Protocol Handler DLL Registry Set
Detects the setting of the DLL that handles the custom protocol handler. Seen being created by Forest Blizzard APT as reported by MSFT.
Sigma rule (View on GitHub)
 1title: Forest Blizzard APT - Custom Protocol Handler DLL Registry Set
 2id: d807056b-0e00-4cec-b7f8-b8b7518e382b
 3status: test
 4description: |
 5    Detects the setting of the DLL that handles the custom protocol handler.
 6    Seen being created by Forest Blizzard APT as reported by MSFT.    
 7references:
 8    - https://www.microsoft.com/en-us/security/blog/2024/04/22/analyzing-forest-blizzards-custom-post-compromise-tool-for-exploiting-cve-2022-38028-to-obtain-credentials/
 9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2024-04-23
11tags:
12    - attack.privilege-escalation
13    - attack.persistence
14    - attack.t1547.001
15    - detection.emerging-threats
16logsource:
17    category: registry_set
18    product: windows
19detection:
20    selection:
21        TargetObject|contains: '\CLSID\{026CC6D7-34B2-33D5-B551-CA31EB6CE345}\Server'
22        Details|endswith: '.dll'
23    condition: selection
24falsepositives:
25    - Unlikely
26level: high
References
Related rules
- Forest Blizzard APT - Custom Protocol Handler Creation
- Kapeka Backdoor Autorun Persistence
- Leviathan Registry Key Activity
- Potential KamiKakaBot Activity - Winlogon Shell Persistence
- Potential Ryuk Ransomware Activity
