Potential Persistence Via New AMSI Providers - Registry
Detects when an attacker registers a new AMSI provider in order to achieve persistence
Sigma rule (View on GitHub)
1title: Potential Persistence Via New AMSI Providers - Registry
2id: 33efc23c-6ea2-4503-8cfe-bdf82ce8f705
3status: test
4description: Detects when an attacker registers a new AMSI provider in order to achieve persistence
5references:
6 - https://persistence-info.github.io/Data/amsi.html
7 - https://github.com/gtworek/PSBits/blob/8d767892f3b17eefa4d0668f5d2df78e844f01d8/FakeAMSI/FakeAMSI.c
8author: Nasreddine Bencherchali (Nextron Systems)
9date: 2022-07-21
10modified: 2023-02-07
11tags:
12 - attack.persistence
13logsource:
14 category: registry_add
15 product: windows
16detection:
17 selection:
18 EventType: CreateKey
19 TargetObject|contains:
20 - '\SOFTWARE\Microsoft\AMSI\Providers\'
21 - '\SOFTWARE\WOW6432Node\Microsoft\AMSI\Providers\'
22 filter:
23 Image|startswith:
24 - 'C:\Windows\System32\'
25 - 'C:\Program Files\'
26 - 'C:\Program Files (x86)\'
27 condition: selection and not filter
28falsepositives:
29 - Legitimate security products adding their own AMSI providers. Filter these according to your environment
30level: high
References
Related rules
- A Member Was Added to a Security-Enabled Global Group
- A Member Was Removed From a Security-Enabled Global Group
- A New Trust Was Created To A Domain
- A Security-Enabled Global Group Was Deleted
- AWS ECS Task Definition That Queries The Credential Endpoint