Suspicious Modifications to Windows Security Support Provider (SSP) Registry
Adversaries may modify the Windows Security Support Provider (SSP) configuration in the registry to establish persistence or evade defenses.
Attackers can abuse the Windows Security Support Provider (SSP) mechanism to establish persistence on a compromised system. SSPs are DLLs loaded into the Local Security Authority Subsystem Service (LSASS) process, which handles authentication in Windows. By modifying specific registry keys related to SSP configuration, attackers can force LSASS to load malicious DLLs at startup, effectively creating a persistent backdoor. This technique is often used to maintain unauthorized access to a system even after a reboot. The registry keys of interest are HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages and HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages. Successful exploitation allows the attacker to intercept and manipulate authentication credentials.
Attack Chain
- An attacker gains initial access to a Windows system through an exploit or compromised credentials (not detailed in source).
- The attacker escalates privileges to gain administrative rights on the system.
- The attacker modifies the registry key
HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packagesto include a path to a malicious DLL. - Alternatively, the attacker modifies the registry key
HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packagesto include a path to a malicious DLL. - The attacker triggers a system reboot, or restarts the LSASS process, causing the malicious SSP DLL to be loaded.
- The malicious DLL intercepts authentication credentials and exfiltrates them or performs other malicious actions.
- The attacker maintains persistent access to the system, even after reboots.
Impact
Successful exploitation allows attackers to achieve persistence and potentially compromise sensitive credentials handled by LSASS. This can lead to lateral movement within the network, data exfiltration, and further system compromise. The impact is significant as it bypasses standard security measures and provides a persistent foothold for malicious activities.
Recommendation
- Deploy the Sigma rule “Suspicious SSP Registry Modification” to your SIEM to detect unauthorized modifications to SSP registry keys.
- Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.
- Continuously monitor for unexpected processes writing to the
HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security PackagesandHKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packagesregistry keys. - Review and whitelist legitimate software installers that frequently modify these registry entries to reduce false positives as mentioned in the brief.
- Ensure access controls and permissions are strictly enforced to limit unauthorized modification of critical registry paths related to Security Support Providers.
Detection coverage 2
Suspicious SSP Registry Modification
mediumDetects registry modifications related to the Windows Security Support Provider (SSP) configuration.
Suspicious Process Modifying SSP Registry
mediumDetects processes other than msiexec.exe modifying the Security Packages registry keys.
Detection queries are kept inside the platform. Get full rules →