Potential Persistence Via Custom Protocol Handler
Detects potential persistence activity via the registering of a new custom protocole handlers. While legitimate applications register protocole handlers often times during installation. And attacker can abuse this by setting a custom handler to be used as a persistence mechanism.
Sigma rule (View on GitHub)
1title: Potential Persistence Via Custom Protocol Handler
2id: fdbf0b9d-0182-4c43-893b-a1eaab92d085
3status: test
4description: Detects potential persistence activity via the registering of a new custom protocole handlers. While legitimate applications register protocole handlers often times during installation. And attacker can abuse this by setting a custom handler to be used as a persistence mechanism.
5references:
6 - https://ladydebug.com/blog/2019/06/21/custom-protocol-handler-cph/
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2022-05-30
9modified: 2023-05-12
10tags:
11 - attack.persistence
12 - attack.defense-evasion
13 - attack.t1112
14logsource:
15 category: registry_set
16 product: windows
17detection:
18 selection:
19 TargetObject|startswith: 'HKCR\'
20 Details|startswith: 'URL:'
21 filter_main_ms_trusted:
22 Details|startswith: 'URL:ms-' # Microsoft Protocols usually start with "ms-"
23 filter_main_generic_locations:
24 Image|startswith: # Add more folders to avoid FP
25 - 'C:\Program Files (x86)'
26 - 'C:\Program Files\'
27 - 'C:\Windows\System32\'
28 - 'C:\Windows\SysWOW64\'
29 # Uncomment This section to add specific Protocol Handler names that are know
30 # filter_specific:
31 # Details: 'URL:'
32 condition: selection and not 1 of filter_main_*
33falsepositives:
34 - Many legitimate applications can register a new custom protocol handler. Additional filters needs to applied according to your environment.
35level: medium
References
Related rules
- Activate Suppression of Windows Security Center Notifications
- Add DisallowRun Execution to Registry
- Allow RDP Remote Assistance Feature
- Blackbyte Ransomware Registry
- Blue Mockingbird