SIP and Trust Provider Hijacking (T1553.003)

View on ATT&CK

In Playbook

Associated Tactics

  • Defense Evasion

Defense Evasion (TA0005)

The adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.

View on ATT&CK

Procedure Examples

Description Source(s)
Entrust Datacard. (2017, August 16). How do I enable CAPI 2.0 logging in Windows Vista, Windows 7 and Windows 2008 Server?. Retrieved January 31, 2018. Entrust Enable CAPI2 Aug 2017
Graeber, M. (2017, September 14). PoCSubjectInterfacePackage. Retrieved January 31, 2018. GitHub SIP POC Sept 2017
Graeber, M. (2017, September). Subverting Trust in Windows. Retrieved January 31, 2018. SpectorOps Subverting Trust Sept 2017
Hudek, T. (2017, April 20). Catalog Files and Digital Signatures. Retrieved January 31, 2018. Microsoft Catalog Files and Signatures April 2017
Microsoft. (2012, July 2). Audit Registry. Retrieved January 31, 2018. Microsoft Audit Registry July 2012
Microsoft. (2016, August 31). Registry (Global Object Access Auditing). Retrieved January 31, 2018. Microsoft Registry Auditing Aug 2016
Microsoft. (n.d.). Authenticode. Retrieved January 31, 2018. Microsoft Authenticode
Microsoft. (n.d.). WinVerifyTrust function. Retrieved January 31, 2018. Microsoft WinVerifyTrust
Navarro, E. (2008, July 11). SIP’s (Subject Interface Package) and Authenticode. Retrieved January 31, 2018. EduardosBlog SIPs July 2008