Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
14 Days |
Required Data |
|
Detection Modules |
|
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
Boot or Logon Autostart Execution: Authentication Package (T1547.002) |
Severity |
Medium |
Description
The endpoint registered a suspicious authentication package, which may be used to gain persistence on the host by loading libraries into the time management service.
Attacker's Goals
Gain persistence using the legitimate Windows authentication package mechanism, which loads libraries into Windows services.
Investigative actions
- Verify if the registered library is malicious.
- Check if the installing software is a malicious binary.
- Check for any suspicious network activity from "lsass.exe".