通过服务 ImagePath 修改进行潜在权限提升
编辑通过服务 ImagePath 修改进行潜在权限提升
编辑识别对可能启用对 SYSTEM 的权限提升的默认服务的注册表修改。拥有服务器操作员等组权限的攻击者可能会将其服务的 ImagePath 更改为其控制下的可执行文件或执行命令。
规则类型: eql
规则索引:
- logs-endpoint.events.registry-*
- logs-windows.sysmon_operational-*
- winlogbeat-*
严重性: 中等
风险评分: 47
每隔: 5 分钟运行
搜索索引自: now-9m (日期数学格式,另请参见 额外回溯时间
)
每次执行的最大告警数: 100
参考:
标签:
- 领域:端点
- 操作系统:Windows
- 用例:威胁检测
- 战术:执行
- 战术:权限提升
- 数据源:Elastic Defend
- 数据源:Sysmon
版本: 102
规则作者:
- Elastic
规则许可证: Elastic License v2
规则查询
编辑registry where host.os.type == "windows" and event.type == "change" and process.executable != null and event.action == "modification" and registry.value == "ImagePath" and registry.key : ( "*\\ADWS", "*\\AppHostSvc", "*\\AppReadiness", "*\\AudioEndpointBuilder", "*\\AxInstSV", "*\\camsvc", "*\\CertSvc", "*\\COMSysApp", "*\\CscService", "*\\defragsvc", "*\\DeviceAssociationService", "*\\DeviceInstall", "*\\DevQueryBroker", "*\\Dfs", "*\\DFSR", "*\\diagnosticshub.standardcollector.service", "*\\DiagTrack", "*\\DmEnrollmentSvc", "*\\DNS", "*\\dot3svc", "*\\Eaphost", "*\\GraphicsPerfSvc", "*\\hidserv", "*\\HvHost", "*\\IISADMIN", "*\\IKEEXT", "*\\InstallService", "*\\iphlpsvc", "*\\IsmServ", "*\\LanmanServer", "*\\MSiSCSI", "*\\NcbService", "*\\Netlogon", "*\\Netman", "*\\NtFrs", "*\\PlugPlay", "*\\Power", "*\\PrintNotify", "*\\ProfSvc", "*\\PushToInstall", "*\\RSoPProv", "*\\sacsvr", "*\\SENS", "*\\SensorDataService", "*\\SgrmBroker", "*\\ShellHWDetection", "*\\shpamsvc", "*\\StorSvc", "*\\svsvc", "*\\swprv", "*\\SysMain", "*\\Themes", "*\\TieringEngineService", "*\\TokenBroker", "*\\TrkWks", "*\\UALSVC", "*\\UserManager", "*\\vm3dservice", "*\\vmicguestinterface", "*\\vmicheartbeat", "*\\vmickvpexchange", "*\\vmicrdv", "*\\vmicshutdown", "*\\vmicvmsession", "*\\vmicvss", "*\\vmvss", "*\\VSS", "*\\w3logsvc", "*\\W3SVC", "*\\WalletService", "*\\WAS", "*\\wercplsupport", "*\\WerSvc", "*\\Winmgmt", "*\\wisvc", "*\\wmiApSrv", "*\\WPDBusEnum", "*\\WSearch" ) and not ( registry.data.strings : ( "?:\\Windows\\system32\\*.exe", "%systemroot%\\system32\\*.exe", "%windir%\\system32\\*.exe", "%SystemRoot%\\system32\\svchost.exe -k *", "%windir%\\system32\\svchost.exe -k *" ) and not registry.data.strings : ( "*\\cmd.exe", "*\\cscript.exe", "*\\ieexec.exe", "*\\iexpress.exe", "*\\installutil.exe", "*\\Microsoft.Workflow.Compiler.exe", "*\\msbuild.exe", "*\\mshta.exe", "*\\msiexec.exe", "*\\msxsl.exe", "*\\net.exe", "*\\powershell.exe", "*\\pwsh.exe", "*\\reg.exe", "*\\RegAsm.exe", "*\\RegSvcs.exe", "*\\regsvr32.exe", "*\\rundll32.exe", "*\\vssadmin.exe", "*\\wbadmin.exe", "*\\wmic.exe", "*\\wscript.exe" ) )
框架: MITRE ATT&CKTM
-
战术
- 名称:权限提升
- ID:TA0004
- 参考网址:https://attack.mitre.org/tactics/TA0004/
-
技术
- 名称:创建或修改系统进程
- ID:T1543
- 参考网址:https://attack.mitre.org/techniques/T1543/
-
子技术
- 名称:Windows 服务
- ID:T1543.003
- 参考网址:https://attack.mitre.org/techniques/T1543/003/
-
技术
- 名称:劫持执行流程
- ID:T1574
- 参考网址:https://attack.mitre.org/techniques/T1574/
-
子技术
- 名称:服务注册表权限弱点
- ID:T1574.011
- 参考网址:https://attack.mitre.org/techniques/T1574/011/
-
战术
- 名称:执行
- ID:TA0002
- 参考网址:https://attack.mitre.org/tactics/TA0002/
-
技术
- 名称:系统服务
- ID:T1569
- 参考网址:https://attack.mitre.org/techniques/T1569/
-
子技术
- 名称:服务执行
- ID:T1569.002
- 参考网址:https://attack.mitre.org/techniques/T1569/002/