Detection of Adversary-in-the-Middle

Technique Detected:  Adversary-in-the-Middle | T0830

ID: DET0764
Domains: ICS
Analytics: AN1896
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN1896

Monitor HKLM\Software\Policies\Microsoft\Windows NT\DNSClient for changes to the "EnableMulticast" DWORD value. A value of "0" indicates LLMNR is disabled.
Host-based implementations of this technique may utilize networking-based system calls or network utility commands (e.g., iptables) to locally intercept traffic. Monitor for relevant process creation events.
Monitor for network traffic originating from unknown/unexpected hosts. Local network traffic metadata (such as source MAC addressing) as well as usage of network management protocols such as DHCP may be helpful in identifying hardware. For added context on adversary procedures and background see Adversary-in-the-Middle and applicable sub-techniques.
Monitor for newly constructed services/daemons through Windows event logs for event IDs 4697 and 7045.
Monitor network traffic for anomalies associated with known AiTM behavior. For Collection activity where transmitted data is not manipulated, anomalies may be present in network management protocols (e.g., ARP, DHCP).
Monitor application logs for changes to settings and other events associated with network protocols and other services commonly abused for AiTM.

Log Sources
Data Component Name Channel
Windows Registry Key Modification (DC0063) Windows Registry None
Process Creation (DC0032) Process None
Network Traffic Flow (DC0078) Network Traffic None
Service Creation (DC0060) Service None
Network Traffic Content (DC0085) Network Traffic None
Application Log Content (DC0038) Application Log None