Potential LSA Authentication Package Abuse
Adversaries can abuse the Local Security Authority (LSA) authentication packages by modifying the Windows registry to achieve privilege escalation or persistence by executing binaries with SYSTEM privileges.
Adversaries can exploit the Local Security Authority (LSA) authentication packages in Windows to escalate privileges or establish persistence. This involves modifying specific registry paths to include references to malicious binaries. When the authentication packages are loaded, these binaries are executed with SYSTEM privileges, effectively granting the attacker elevated access. The Elastic detection rule identifies unauthorized registry changes to LSA authentication packages by non-SYSTEM users, signaling potential malicious activity. This technique can be used for long-term persistence or immediate privilege escalation, allowing attackers to perform unauthorized actions on the compromised system. The rule leverages data from Elastic Defend and Microsoft Defender XDR to detect these unauthorized modifications.
Attack Chain
- An attacker gains initial access to a system through unspecified means.
- The attacker identifies the
HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Authentication Packagesregistry key as a target for persistence and privilege escalation. - The attacker modifies the registry key to include a path to a malicious binary. This binary will be loaded as an authentication package.
- The operating system loads the LSA authentication packages during system startup or user logon.
- The malicious binary, now executed with SYSTEM privileges, performs actions dictated by the attacker.
- This could involve creating new user accounts with administrative privileges, installing backdoors, or disabling security controls.
- The attacker establishes persistence, ensuring that the malicious binary is executed every time the system starts or a user logs on.
Impact
Successful exploitation of LSA authentication packages allows an attacker to gain SYSTEM-level privileges on the compromised system. This can lead to complete system compromise, data theft, and the installation of persistent backdoors. The rule aims to detect unauthorized changes to these packages, preventing attackers from establishing persistence and escalating privileges.
Recommendation
- Deploy the provided Sigma rules to your SIEM and tune for your environment to detect unauthorized changes to the LSA authentication packages.
- Investigate any alerts generated by the Sigma rules, focusing on registry changes made by non-SYSTEM users to the
HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Authentication Packagesregistry key. - Enable registry auditing to capture changes to sensitive registry keys, including the LSA authentication packages path, to improve detection capabilities.
- Utilize Elastic Defend and Microsoft Defender XDR for endpoint detection and response, as these data sources are specifically supported by the detection rule.
Detection coverage 2
Detect LSA Authentication Package Registry Modification by Non-SYSTEM User
mediumDetects modifications to the LSA Authentication Packages registry key by users other than SYSTEM, indicating potential privilege escalation or persistence attempts.
Detect Image Load from LSA Authentication Packages Path
mediumDetects image loads from the LSA Authentication Packages path
Detection queries are kept inside the platform. Get full rules →