Detectionmediumtest
ServiceDll Hijack
Detects changes to the "ServiceDLL" value related to a service in the registry. This is often used as a method of persistence.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
WindowsRegistry Set
ProductWindows← raw: windows
CategoryRegistry Set← raw: registry_set
Detection Logic
Detection Logic5 selectors
detection:
selection:
TargetObject|contains|all:
- '\System\'
- 'ControlSet'
- '\Services\'
TargetObject|endswith: '\Parameters\ServiceDll'
filter_main_printextensionmanger:
Details: 'C:\Windows\system32\spool\drivers\x64\3\PrintConfig.dll'
filter_main_domain_controller:
Image: 'C:\Windows\system32\lsass.exe'
TargetObject|endswith: '\Services\NTDS\Parameters\ServiceDll'
Details: '%%systemroot%%\system32\ntdsa.dll'
filter_main_poqexec:
Image: 'C:\Windows\System32\poqexec.exe'
filter_optional_safetica:
Image|endswith: '\regsvr32.exe'
Details: 'C:\Windows\System32\STAgent.dll'
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*False Positives
Administrative scripts
Installation of a service
MITRE ATT&CK
Sub-techniques
Rule Metadata
Rule ID
612e47e9-8a59-43a6-b404-f48683f45bd6
Status
test
Level
medium
Type
Detection
Created
Fri Feb 04
Modified
Wed Apr 03
Author
Path
rules/windows/registry/registry_set/registry_set_servicedll_hijack.yml
Raw Tags
attack.persistenceattack.privilege-escalationattack.t1543.003