Persistence Via New SIP Provider

Detects when an attacker register a new SIP provider for persistence and defense evasion

Sigma rule (View on GitHub)

 1title: Persistence Via New SIP Provider
 2id: 5a2b21ee-6aaa-4234-ac9d-59a59edf90a1
 3status: experimental
 4description: Detects when an attacker register a new SIP provider for persistence and defense evasion
 5references:
 6    - https://persistence-info.github.io/Data/codesigning.html
 7    - https://github.com/gtworek/PSBits/tree/master/SIP
 8    - https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf
 9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2022/07/21
11modified: 2023/08/17
12tags:
13    - attack.persistence
14    - attack.defense_evasion
15    - attack.t1553.003
16logsource:
17    category: registry_set
18    product: windows
19detection:
20    selection_root:
21        TargetObject|contains:
22            - '\SOFTWARE\Microsoft\Cryptography\Providers\'
23            - '\SOFTWARE\Microsoft\Cryptography\OID\EncodingType'
24            - '\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\'
25            - '\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType'
26    selection_dll:
27        TargetObject|contains:
28            - '\Dll'
29            - '\$DLL'
30    filter:
31        Details:
32            # Add more legitimate SIP providers according to your env
33            - WINTRUST.DLL
34            - mso.dll
35    filter_poqexec:
36        Image: 'C:\Windows\System32\poqexec.exe'
37        TargetObject|contains: '\CryptSIPDll'
38        Details: 'C:\Windows\System32\PsfSip.dll'
39    condition: all of selection_* and not 1 of filter*
40falsepositives:
41    - Legitimate SIP being registered by the OS or different software.
42level: medium

References

Related rules

to-top