T1556.008

Network Provider DLL

Adversaries may register malicious network provider DLLs to capture cleartext user credentials. Windows Winlogon sends credentials to mpnotify.exe during logon, which shares plaintext credentials with all registered credential managers via NPLogonNotify(). A malicious DLL registered as a network provider via HKLM\SYSTEM\CurrentControlSet\Services\<name>\NetworkProvider and HKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order receives cleartext passwords every login. NPPSpy by Grzegorz Tworek is a PoC implementation. Attackers target servers and DCs with high logon frequency.

Microsoft Sentinel / Defender
kusto
let NetworkProviderRegistry = DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has_any (
    @"Control\NetworkProvider",
    @"CurrentControlSet\Control\NetworkProvider",
    @"Services\NetworkProvider"
  )
| where RegistryValueName in~ ("Order", "Name", "ProviderPath") or RegistryKey has "NetworkProvider"
| project Timestamp, DeviceName, AccountName, ActionType, RegistryKey,
          RegistryValueName, RegistryValueData, InitiatingProcessFileName, InitiatingProcessCommandLine;
let NewServiceDLL = DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has @"CurrentControlSet\Services"
| where RegistryValueName in~ ("ProviderPath", "NetworkProvider")
| project Timestamp, DeviceName, AccountName, ActionType, RegistryKey,
          RegistryValueName, RegistryValueData, InitiatingProcessFileName;
let NewDLLInSystem32 = DeviceFileEvents
| where Timestamp > ago(24h)
| where FolderPath =~ @"C:\Windows\System32"
| where FileName endswith ".dll"
| where InitiatingProcessFileName !in~ (
    "msiexec.exe", "wusa.exe", "TrustedInstaller.exe", "svchost.exe", "poqexec.exe"
  )
| project Timestamp, DeviceName, FileName, FolderPath, InitiatingProcessFileName,
          InitiatingProcessCommandLine, SHA256;
union NetworkProviderRegistry, NewServiceDLL, NewDLLInSystem32
| sort by Timestamp desc
critical severity high confidence

Data Sources

Windows Registry: Registry Key Modification File: File Creation Process: Process Creation Microsoft Defender for Endpoint

Required Tables

DeviceRegistryEvents DeviceFileEvents

False Positives

  • Legitimate third-party network providers installed by enterprise software (e.g., Novell Client, VPN software, enterprise SSO solutions)
  • Windows updates or service packs that modify NetworkProvider registry keys
  • Corporate VPN clients or remote desktop software registering custom network providers
  • Enterprise authentication middleware products that integrate with Windows logon via the Network Provider API

Unlock Pro Content

Get the full detection package for T1556.008 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections