通过服务 ImagePath 修改实现潜在特权升级
编辑通过服务 ImagePath 修改实现潜在特权升级编辑
识别对默认服务的注册表修改,该修改可能使特权升级到 SYSTEM。具有服务器操作员等组的特权的攻击者可以将服务的 ImagePath 更改为他们控制下的可执行文件或用于执行命令。
规则类型: eql
规则索引:
- logs-endpoint.events.registry-*
- logs-windows.sysmon_operational-*
严重性: 中等
风险评分: 47
每隔: 5m
从以下时间开始搜索索引: now-9m (日期数学格式,另请参见 附加回溯时间
)
每次执行的最大警报数: 100
参考:
标签:
- 域:端点
- 操作系统:Windows
- 用例:威胁检测
- 策略:执行
- 策略:特权升级
- 数据源:Elastic Defend
- 数据源:Sysmon
版本: 1
规则作者:
- Elastic
规则许可证: Elastic License v2
规则查询编辑
registry where host.os.type == "windows" and event.type == "change" and process.executable != null and event.action == "modification" and registry.value == "ImagePath" and registry.key : ( "*\\ADWS", "*\\AppHostSvc", "*\\AppReadiness", "*\\AudioEndpointBuilder", "*\\AxInstSV", "*\\camsvc", "*\\CertSvc", "*\\COMSysApp", "*\\CscService", "*\\defragsvc", "*\\DeviceAssociationService", "*\\DeviceInstall", "*\\DevQueryBroker", "*\\Dfs", "*\\DFSR", "*\\diagnosticshub.standardcollector.service", "*\\DiagTrack", "*\\DmEnrollmentSvc", "*\\DNS", "*\\dot3svc", "*\\Eaphost", "*\\GraphicsPerfSvc", "*\\hidserv", "*\\HvHost", "*\\IISADMIN", "*\\IKEEXT", "*\\InstallService", "*\\iphlpsvc", "*\\IsmServ", "*\\LanmanServer", "*\\MSiSCSI", "*\\NcbService", "*\\Netlogon", "*\\Netman", "*\\NtFrs", "*\\PlugPlay", "*\\Power", "*\\PrintNotify", "*\\ProfSvc", "*\\PushToInstall", "*\\RSoPProv", "*\\sacsvr", "*\\SENS", "*\\SensorDataService", "*\\SgrmBroker", "*\\ShellHWDetection", "*\\shpamsvc", "*\\StorSvc", "*\\svsvc", "*\\swprv", "*\\SysMain", "*\\Themes", "*\\TieringEngineService", "*\\TokenBroker", "*\\TrkWks", "*\\UALSVC", "*\\UserManager", "*\\vm3dservice", "*\\vmicguestinterface", "*\\vmicheartbeat", "*\\vmickvpexchange", "*\\vmicrdv", "*\\vmicshutdown", "*\\vmicvmsession", "*\\vmicvss", "*\\vmvss", "*\\VSS", "*\\w3logsvc", "*\\W3SVC", "*\\WalletService", "*\\WAS", "*\\wercplsupport", "*\\WerSvc", "*\\Winmgmt", "*\\wisvc", "*\\wmiApSrv", "*\\WPDBusEnum", "*\\WSearch" ) and not ( registry.data.strings : ( "?:\\Windows\\system32\\*.exe", "%systemroot%\\system32\\*.exe", "%windir%\\system32\\*.exe", "%SystemRoot%\\system32\\svchost.exe -k *", "%windir%\\system32\\svchost.exe -k *" ) and not registry.data.strings : ( "*\\cmd.exe", "*\\cscript.exe", "*\\ieexec.exe", "*\\iexpress.exe", "*\\installutil.exe", "*\\Microsoft.Workflow.Compiler.exe", "*\\msbuild.exe", "*\\mshta.exe", "*\\msiexec.exe", "*\\msxsl.exe", "*\\net.exe", "*\\powershell.exe", "*\\pwsh.exe", "*\\reg.exe", "*\\RegAsm.exe", "*\\RegSvcs.exe", "*\\regsvr32.exe", "*\\rundll32.exe", "*\\vssadmin.exe", "*\\wbadmin.exe", "*\\wmic.exe", "*\\wscript.exe" ) )
框架: MITRE ATT&CKTM
-
策略
- 名称:权限提升
- ID:TA0004
- 参考网址:https://attack.mitre.org/tactics/TA0004/
-
技术
- 名称:创建或修改系统进程
- ID:T1543
- 参考网址:https://attack.mitre.org/techniques/T1543/
-
子技术
- 名称:Windows 服务
- ID:T1543.003
- 参考网址:https://attack.mitre.org/techniques/T1543/003/
-
技术
- 名称:劫持执行流
- ID:T1574
- 参考网址:https://attack.mitre.org/techniques/T1574/
-
子技术
- 名称:服务注册表权限弱点
- ID:T1574.011
- 参考网址:https://attack.mitre.org/techniques/T1574/011/
-
策略
- 名称:执行
- ID:TA0002
- 参考网址:https://attack.mitre.org/tactics/TA0002/
-
技术
- 名称:系统服务
- ID:T1569
- 参考网址:https://attack.mitre.org/techniques/T1569/
-
子技术
- 名称:服务执行
- ID:T1569.002
- 参考网址:https://attack.mitre.org/techniques/T1569/002/