ServiceDll Hijack
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects changes to the "ServiceDLL" value related to a service in the registry. This is often used as a method of persistence.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "Registry value modified" AND (((OBJECTNAME contains "\System" AND OBJECTNAME contains "ControlSet" AND OBJECTNAME contains "\Services") OR (OBJECTNAME endswith "\System" AND isExist(OBJECTVALUENAME))) AND (OBJECTNAME endswith "\Parameters\ServiceDll" OR (OBJECTNAME endswith "\Parameters" AND OBJECTVALUENAME = "ServiceDll"))) AND (INFORMATION != "C:\Windows\system32\spool\drivers\x64\3\PrintConfig.dll" AND (PROCESSNAME != "C:\Windows\system32\lsass.exe" OR (OBJECTNAME notendswith "\Services\NTDS\Parameters\ServiceDll" AND (OBJECTNAME notendswith "\Services\NTDS\Parameters" OR OBJECTVALUENAME != "ServiceDll")) OR INFORMATION != "%%systemroot%%\system32\ntdsa.dll") AND PROCESSNAME != "C:\Windows\System32\poqexec.exe") AND (PROCESSNAME notendswith "\regsvr32.exe" OR INFORMATION != "C:\Windows\System32\STAgent.dll") select Action1.HOSTNAME,Action1.MESSAGE,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.PREVVAL,Action1.CHANGES
Detection
Execution Mode
realtime
Log Sources
Windows
Author
frack113


