<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Appcert-Dll — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/appcert-dll/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/appcert-dll/feed.xml" rel="self" type="application/rss+xml"/><item><title>Registry Persistence via AppCert DLL Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-appcert-dll-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-appcert-dll-persistence/</guid><description>Detection of registry modifications related to AppCert DLLs, a persistence mechanism where malicious DLLs are loaded by every process using common API functions.</description><content:encoded><![CDATA[<p>The rule detects attempts to maintain persistence by creating or modifying registry keys associated with AppCert DLLs on Windows systems. AppCert DLLs are loaded by every process that uses common API functions to create processes, making them a viable target for persistence. Adversaries can exploit this by inserting malicious DLL paths into the registry, ensuring their code executes persistently across system reboots. This technique is often used for privilege escalation and persistence. The rule specifically looks for changes in the registry path <code>HKLM\SYSTEM\ControlSet*\Control\Session Manager\AppCertDLLs\*</code>, as well as the equivalent <code>\\REGISTRY\\MACHINE\\SYSTEM\...</code> path. This activity matters because it can lead to stealthy and persistent malware infections. The rule is designed for use with data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Crowdstrike, and Sysmon. The detection logic was last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker obtains necessary privileges to modify the Windows Registry, potentially requiring administrator rights.</li>
<li>The attacker creates or modifies a registry key under <code>HKLM\SYSTEM\ControlSet*\Control\Session Manager\AppCertDLLs\*</code> to point to a malicious DLL.</li>
<li>The malicious DLL is placed on the file system, often in a location that appears legitimate or is easily accessible.</li>
<li>Any process that uses the standard Windows API to create new processes will load the specified DLL.</li>
<li>The malicious DLL executes its payload, which could include establishing persistence, injecting into other processes, or performing other malicious activities.</li>
<li>The attacker maintains persistence by ensuring the malicious DLL is loaded every time a new process is created.</li>
<li>The final objective is to maintain long-term access to the compromised system, potentially escalating privileges and moving laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistent code execution on the system. This can lead to complete system compromise, data theft, or further propagation of malware within the network. The use of AppCert DLLs allows the malicious code to run in the context of nearly every process, making detection and removal more challenging. Without proper detection and response mechanisms, an attacker can maintain control of the system indefinitely.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging and configure it to monitor the relevant AppCertDLLs registry paths to capture the necessary events for the rules (Data Source: Sysmon).</li>
<li>Deploy the provided Sigma rule <code>Detect AppCert DLL Registry Modification</code> to your SIEM to detect unauthorized modifications to the AppCertDLLs registry keys (Rule: Detect AppCert DLL Registry Modification).</li>
<li>Investigate any alerts generated by the rule <code>Detect AppCert DLL Registry Modification</code> to determine the legitimacy of the registry modifications, using the provided triage steps as a guide.</li>
<li>Regularly scan systems for malicious DLLs located in the file system using updated antivirus and anti-malware tools, focusing on DLLs referenced in the AppCertDLLs registry keys.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>appcert-dll</category></item></channel></rss>