Persistence Via New SIP Provider
Detects when an attacker register a new SIP provider for persistence and defense evasion
Sigma rule (View on GitHub)
1title: Persistence Via New SIP Provider
2id: 5a2b21ee-6aaa-4234-ac9d-59a59edf90a1
3status: test
4description: Detects when an attacker register a new SIP provider for persistence and defense evasion
5references:
6 - https://persistence-info.github.io/Data/codesigning.html
7 - https://github.com/gtworek/PSBits/tree/master/SIP
8 - https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2022-07-21
11modified: 2023-08-17
12tags:
13 - attack.persistence
14 - attack.defense-evasion
15 - attack.t1553.003
16logsource:
17 category: registry_set
18 product: windows
19detection:
20 selection_root:
21 TargetObject|contains:
22 - '\SOFTWARE\Microsoft\Cryptography\Providers\'
23 - '\SOFTWARE\Microsoft\Cryptography\OID\EncodingType'
24 - '\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\'
25 - '\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType'
26 selection_dll:
27 TargetObject|contains:
28 - '\Dll'
29 - '\$DLL'
30 filter:
31 Details:
32 # Add more legitimate SIP providers according to your env
33 - WINTRUST.DLL
34 - mso.dll
35 filter_poqexec:
36 Image: 'C:\Windows\System32\poqexec.exe'
37 TargetObject|contains: '\CryptSIPDll'
38 Details: 'C:\Windows\System32\PsfSip.dll'
39 condition: all of selection_* and not 1 of filter*
40falsepositives:
41 - Legitimate SIP being registered by the OS or different software.
42level: medium
References
Related rules
- Kapeka Backdoor Configuration Persistence
- Abuse of Service Permissions to Hide Services Via Set-Service
- Abuse of Service Permissions to Hide Services Via Set-Service - PS
- Account Tampering - Suspicious Failed Logon Reasons
- Activity From Anonymous IP Address