T1547.005 Security Support Provider Mappings

Adversaries may abuse security support providers (SSPs) to execute DLLs when the system boots. Windows SSP DLLs are loaded into the Local Security Authority (LSA) process at system start. Once loaded into the LSA, SSP DLLs have access to encrypted and plaintext passwords that are stored in Windows, such as any logged-on user's Domain password or smart card PINs.

The SSP configuration is stored in two Registry keys: <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Security Packages</code> and <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa\OSConfig\Security Packages</code>. An adversary may modify these Registry keys to add new SSPs, which will be loaded the next time the system boots, or when the AddSecurityPackage Windows API function is called.(Citation: Graeber 2014)

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CM-6 Configuration Settings Protects T1547.005 Security Support Provider
SC-39 Process Isolation Protects T1547.005 Security Support Provider
SI-3 Malicious Code Protection Protects T1547.005 Security Support Provider
SI-4 System Monitoring Protects T1547.005 Security Support Provider
SI-7 Software, Firmware, and Information Integrity Protects T1547.005 Security Support Provider
azure_sentinel Azure Sentinel technique_scores T1547.005 Security Support Provider
Comments
The Azure Sentinel Analytics "Powershell Empire cmdlets seen in command line" query can detect the use of Empire, which can enumerate SSPs, install malicious SSPs, persist by modifying .lnk files to include backdoors, and modify the registry run keys, but does not address other procedures.
References
    file_integrity_monitoring File Integrity Monitoring technique_scores T1547.005 Security Support Provider
    Comments
    This control may detect changes to the Windows registry or files that enable Boot or Logon Autostart Execution. This control at worst scans for changes on an hourly basis.
    References
      azure_defender_for_app_service Azure Defender for App Service technique_scores T1547.005 Security Support Provider
      Comments
      This control analyzes host data to detect execution of known malicious PowerShell PowerSploit cmdlets. This covers execution of this sub-technique via the Install-SSP module on Windows, but does not address other procedures or platforms, and temporal factor is unknown, resulting in a Minimal score.
      References