269. That's How Adversaries Abuse Features of Winlogon

Hello everyone!

Today we'll look at another persistence mechanism, which you don't see ITW very often. I'm talking about the following technique - Boot or Logon Autostart Execution: Winlogon Helper DLL (T1547.004).

According to this report, the adversary modified Winlogon key in order to achieve persistence:

reg add '"hkcu\software\microsoft\windows nt\currentversion\winlogon'" /f /v Shell /t REG_SZ /d '"$($sv.Replace('"', '\"'))'""

 Such registry modification enables the malicious script to run at every user login along with explorer.exe.

At the same time, it's a detection opportunity for us:

event_type: "processcreatewin"

AND

proc_file_path: "reg.exe"

AND

cmdline: ("add" AND "winlogon" AND "shell")

See you tomorrow!


Comments

Popular posts from this blog

082. Huniting for Malicious Browser Extensions

033. Free Google Threat Intelligence Course

068. Detecting RMMs from Ransomware Affiliate's Toolkit: MeshAgent