Detectionhightest

LSA PPL Protection Disabled Via Reg.EXE

Detects the usage of the "reg.exe" utility to disable PPL protection on the LSA process

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Florian Roth (Nextron Systems)Created Tue Mar 22Updated Sun Mar 268c0eca51-0f88-4db2-9183-fdfb10c703f9windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic2 selectors
detection:
    selection_img:
        - Image|endswith: '\reg.exe'
        - OriginalFileName: 'reg.exe'
    selection_cli:
        CommandLine|contains: 'SYSTEM\CurrentControlSet\Control\Lsa'
        CommandLine|contains|all:
            - ' add '
            - ' /d 0'
            - ' /v RunAsPPL '
    condition: all of selection_*
False Positives
Unlikely

False positives are unlikely for most environments. High confidence detection.

Rule Metadata
Rule ID
8c0eca51-0f88-4db2-9183-fdfb10c703f9
Status
test
Level
high
Type
Detection
Created
Tue Mar 22
Modified
Sun Mar 26
Path
rules/windows/process_creation/proc_creation_win_reg_lsa_ppl_protection_disabled.yml
Raw Tags
attack.defense-evasionattack.t1562.010
View on GitHub