T1556.008: Network Provider DLL
Adversaries may register malicious network provider dynamic link libraries (DLLs) to capture cleartext user credentials during the authentication process. Network provider DLLs allow Windows to interface with specific network protocols and can also support add-on credential management functions. During the logon process, Winlogon (the interactive logon module) sends credentials to the local mpnotify.exe
process via RPC. The mpnotify.exe
process then shares the credentials in cleartext with registered credential managers when notifying that a logon event is happening.
Adversaries can configure a malicious network provider DLL to receive credentials from mpnotify.exe
. Once installed as a credential manager (via the Registry), a malicious DLL can receive and save credentials each time a user logs onto a Windows workstation or domain via the NPLogonNotify()
function.
Adversaries may target planting malicious network provider DLLs on systems known to have increased logon activity and/or administrator logon activity, such as servers and domain controllers.
Positive Technologies products that cover the technique
MaxPatrol SIEM knowledge base
mitre_attck_persistence: PT-CR-2633: Network_Provider_Modification: A new network provider was created or registered by modifying registry keys. This may indicate an attacker's attempt to gain persistence in the system using a new network provider DLL. mitre_attck_persistence: PT-CR-2623: Suspicious_Network_Provider_DLL_Loaded: The mpnotify.exe process loaded a suspicious DLL. This may indicate an attacker's attempt to gain persistence in the system by creating a new network provider.
Detection
ID | DS0024 | Data source and component | Windows Registry: Windows Registry Key Creation | Description | Monitor for the addition of network provider Registry keys (e.g., |
---|
ID | DS0024 | Data source and component | Windows Registry: Windows Registry Key Modification | Description | Monitor for changes to Registry entries for network providers (e.g., |
---|
ID | DS0022 | Data source and component | File: File Creation | Description | Monitor for newly created files that may be used to register malicious network provider dynamic link libraries (DLLs). |
---|
ID | DS0009 | Data source and component | Process: OS API Execution | Description | Monitor for abnormal API calls to |
---|
Mitigation
ID | M1024 | Name | Restrict Registry Permissions | Description | Restrict Registry permissions to disallow the modification of sensitive Registry keys such as |
---|
ID | M1047 | Name | Audit | Description | Periodically review for new and unknown network provider DLLs within the Registry ( Ensure only valid network provider DLLs are registered. The name of these can be found in the Registry key at |
---|
ID | M1028 | Name | Operating System Configuration | Description | Starting in Windows 11 22H2, the |
---|