Skip to content
Threat Feed
medium advisory

LSA PPL Protection Setting Modification via CommandLine

Attackers modify LSA PPL protection settings via command-line tools like reg.exe and PowerShell to weaken system security and enable credential dumping.

Attackers are increasingly targeting Local Security Authority (LSA) Protected Process Light (PPL) settings to disable this security mechanism, which protects sensitive processes like LSASS from unauthorized access. By modifying registry keys related to LSA PPL, attackers can weaken system defenses and facilitate credential dumping. This technique is often employed after gaining initial access to a system as a post-exploitation step. The use of command-line tools such as reg.exe, powershell.exe, and pwsh.exe for these modifications allows for automation and stealth. While the exact campaigns and threat actors using this are varied, the end goal remains the same: to bypass security controls and steal credentials.

Attack Chain

  1. Initial access is gained through unspecified means.
  2. The attacker uses reg.exe, powershell.exe, or pwsh.exe to modify the registry.
  3. The command line contains “ControlSet” and “\Control\Lsa” to target LSA settings.
  4. Specific registry keys targeted include “IsPplAutoEnabled”, “RunAsPPL”, and “RunAsPPLBoot”.
  5. The attacker uses “Set-ItemProperty”, “New-ItemProperty”, or " add " to change registry values.
  6. LSA PPL protection is disabled by modifying the targeted registry keys.
  7. Credential dumping tools are deployed to extract credentials from LSASS memory.
  8. Stolen credentials are used for lateral movement or privilege escalation.

Impact

Successful modification of LSA PPL settings allows attackers to bypass a critical security control, making systems more vulnerable to credential theft. This can lead to widespread compromise within an organization, as stolen credentials can be used to access sensitive data, critical systems, and intellectual property. While the number of affected organizations is not specified, any Windows system relying on LSA PPL is potentially at risk.

Recommendation

  • Deploy the Sigma rule “LSA PPL Protection Setting Modification via CommandLine” to your SIEM and tune for your environment to detect suspicious command-line activity targeting LSA PPL settings.
  • Enable Sysmon process-creation logging to activate the rule above.
  • Monitor for unexpected modifications to the registry keys “IsPplAutoEnabled”, “RunAsPPL”, and “RunAsPPLBoot” under the “ControlSet…\Control\Lsa” path, which can indicate attempts to disable LSA PPL protection.

Detection coverage 2

LSA PPL Protection Setting Modification via CommandLine

medium

Detects modification of LSA PPL protection settings via CommandLine, which may indicate an attempt to disable protection and enable credential dumping tools to access LSASS process memory.

sigma tactics: defense-evasion techniques: T1562.010 sources: process_creation, windows

LSA PPL Protection Setting Modification via pwsh.exe

medium

Detects modification of LSA PPL protection settings via pwsh.exe.

sigma tactics: defense-evasion techniques: T1562.010 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →