-
Notifications
You must be signed in to change notification settings - Fork 522
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Tuning] Uncommon Registry Persistence Change #4286
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add registry rules for additional SMSS persistence vectors
💚 CLA has been signed |
Samirbous
approved these changes
Dec 10, 2024
Samirbous
changed the title
Update persistence_registry_uncommon.toml
[Tuning] Uncommon Registry Persistence Change
Dec 10, 2024
Aegrah
approved these changes
Dec 10, 2024
I've signed the CA |
protectionsmachine
pushed a commit
that referenced
this pull request
Dec 25, 2024
* Update persistence_registry_uncommon.toml Add registry rules for additional SMSS persistence vectors * Update persistence_registry_uncommon.toml * Update persistence_registry_uncommon.toml --------- Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com> Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> (cherry picked from commit c99cf92)
protectionsmachine
pushed a commit
that referenced
this pull request
Dec 25, 2024
* Update persistence_registry_uncommon.toml Add registry rules for additional SMSS persistence vectors * Update persistence_registry_uncommon.toml * Update persistence_registry_uncommon.toml --------- Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com> Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> (cherry picked from commit c99cf92)
protectionsmachine
pushed a commit
that referenced
this pull request
Dec 25, 2024
* Update persistence_registry_uncommon.toml Add registry rules for additional SMSS persistence vectors * Update persistence_registry_uncommon.toml * Update persistence_registry_uncommon.toml --------- Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com> Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> (cherry picked from commit c99cf92)
protectionsmachine
pushed a commit
that referenced
this pull request
Dec 25, 2024
* Update persistence_registry_uncommon.toml Add registry rules for additional SMSS persistence vectors * Update persistence_registry_uncommon.toml * Update persistence_registry_uncommon.toml --------- Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com> Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com> (cherry picked from commit c99cf92)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Add registry rules for additional SMSS persistence vectors
Pull Request
Summary - What I changed
Add additional registry entries for uncommon Windows persistence registry techniques. SMSS.exe will launch a number of additional registry entries as native applications before win32k subsystem init, this can be leveraging for persistence.
How To Test
You can build a native application, an example https://github.com/rad9800/BootExecuteEDR, place the binary in C:\Windows\System32 and add the registry entry (updating the command for the relevant key).
reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v "BootExecute" /t REG_MULTI_SZ /d "autocheck autochk *\0BEB" /f
Automated testing was not added, as it is not currently present for existing BootExecute detections.
Checklist
bug
,enhancement
,schema
,maintenance
,Rule: New
,Rule: Deprecation
,Rule: Tuning
,Hunt: New
, orHunt: Tuning
so guidelines can be generated