Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Techniques
  3. Enterprise
  4. Modify Authentication Process
  5. Network Provider DLL

Modify Authentication Process: Network Provider DLL

Adversaries may register malicious network provider dynamic link libraries (DLLs) to capture cleartext user credentials during the authentication process. Network provider DLLs allow Windows to interface with specific network protocols and can also support add-on credential management functions.[1] During the logon process, Winlogon (the interactive logon module) sends credentials to the localmpnotify.exe process via RPC. Thempnotify.exe process then shares the credentials in cleartext with registered credential managers when notifying that a logon event is happening.[2][3][4]

Adversaries can configure a malicious network provider DLL to receive credentials frommpnotify.exe.[5] Once installed as a credential manager (via the Registry), a malicious DLL can receive and save credentials each time a user logs onto a Windows workstation or domain via theNPLogonNotify() function.[4]

Adversaries may target planting malicious network provider DLLs on systems known to have increased logon activity and/or administrator logon activity, such as servers and domain controllers.[2]

ID: T1556.008
Sub-technique of: T1556
Platforms: Windows
Contributors: CrowdStrike Falcon OverWatch; Jai Minton
Version: 1.0
Created: 30 March 2023
Last Modified: 15 April 2025

Mitigations

IDMitigationDescription
M1047 Audit

Periodically review for new and unknown network provider DLLs within the Registry (HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\<NetworkProviderName>\NetworkProvider\ProviderPath).

Ensure only valid network provider DLLs are registered. The name of these can be found in the Registry key atHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order, and have corresponding service subkey pointing to a DLL atHKEY_LOCAL_MACHINE\SYSTEM\CurrentC ontrolSet\Services\<NetworkProviderName>\NetworkProvider.

M1028 Operating System Configuration

Starting in Windows 11 22H2, theEnableMPRNotifications policy can be disabled through Group Policy or through a configuration service provider to prevent Winlogon from sending credentials to network providers.[6]

M1024 Restrict Registry Permissions

Restrict Registry permissions to disallow the modification of sensitive Registry keys such asHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order.

Detection Strategy

IDNameAnalytic IDAnalytic Description
DET0580Detect Network Provider DLL Registration and Credential CaptureAN1598

Detects registration of new or modified network provider DLLs via registry changes, anomalous file creation of DLLs in system directories, and suspicious process activity (mpnotify.exe interacting with non-standard DLLs). Multi-event correlation ties registry modification events to subsequent DLL loads during user logon activity.

References

×

[8]ページ先頭

©2009-2026 Movatter.jp