Detect LSA Authentication Package Persistence via Registry and LSASS DLL Load

ID: DET0207
Domains: Enterprise
Analytics: AN0583
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN0583

Registry modification of the LSA Authentication Packages key followed by LSASS loading a non-standard or unsigned DLL. This includes unusual write access to HKLM\SYSTEM\CurrentControlSet\Control\Lsa, especially during non-installation timeframes. Correlated with lsass.exe loading DLLs not present in baseline or lacking valid signatures.

Log Sources
Data Component Name Channel
Windows Registry Key Modification (DC0063) WinEventLog:Security EventCode=4657
Module Load (DC0016) WinEventLog:Sysmon EventCode=7
Mutable Elements
Field Description
TimeWindow Time between registry write and DLL load; tune based on reboot cycles or scheduled maintenance
ImageSignatureStatus Allow listing of known signed LSASS-authenticated DLLs versus unknown/untrusted ones
RegistryPathScope Allow tuning for subkeys beyond just `Authentication Packages` (e.g., `Security Packages`, `Notification Packages`)
UserContext Correlate user responsible for registry edit; tune for expected administrative/service accounts
ParentProcess Validate process lineage for registry modification; expected tools like `reg.exe` or `powershell.exe`