Skip to content

Commit 3204077

Browse files
committed
feat(rules): Add Potential mandatory profile registry persistence rule
Identifies suspicious creation of the NTUSER.MAN file within user profile directories, a lesser-known persistence technique that abuses mandatory user profiles. By planting a crafted NTUSER.MAN, an attacker can force Windows to load attacker-controlled registry settings at every logon, achieving durable boot or logon persistence.
1 parent e9d6d30 commit 3204077

1 file changed

Lines changed: 38 additions & 0 deletions

File tree

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
name: Potential mandatory profile registry persistence
2+
id: e9c9fa57-5088-4d40-8a5e-2aa70ec6e189
3+
version: 1.0.0
4+
description: |
5+
Identifies suspicious creation of the NTUSER.MAN file within user profile
6+
directories, a lesser-known persistence technique that abuses mandatory
7+
user profiles. By planting a crafted NTUSER.MAN, an attacker can force
8+
Windows to load attacker-controlled registry settings at every logon,
9+
achieving durable boot or logon persistence.
10+
labels:
11+
tactic.id: TA0003
12+
tactic.name: Persistence
13+
tactic.ref: https://attack.mitre.org/tactics/TA0003/
14+
technique.name: Boot or Logon Autostart Execution
15+
technique.ref: https://attack.mitre.org/techniques/T1547/
16+
subtechnique.id: T1547.001
17+
subtechnique.name: Registry Run Keys / Startup Folder
18+
subtechnique.ref: https://attack.mitre.org/techniques/T1547/001/
19+
references:
20+
- https://deceptiq.com/blog/ntuser-man-registry-persistence
21+
- https://github.com/MHaggis/notes/tree/master/utilities/MandatoryProfilePersistence
22+
23+
condition: >
24+
create_file and
25+
evt.pid != 4 and ps.token.integrity_level != 'SYSTEM' and
26+
file.path imatches '?:\\Users\\*\\NTUSER.MAN' and
27+
ps.exe not imatches
28+
(
29+
'?:\\Windows\\System32\\userinit.exe',
30+
'?:\\Windows\\System32\\winlogon.exe'
31+
) and
32+
not (ps.exe imatches '?:\\Windows\\System32\\svchost.exe' and ps.cmdline matches '*-k UserProfileService -p -s ProfSvc')
33+
action:
34+
- name: kill
35+
36+
severity: high
37+
38+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)