- endpoint-compromise
- persistence
- credential-access
- lateral-movement
- registry-attack
- dameware
Manufacturing Workstation Compromised: Multi-Stage Attack with Persistence and Credential Harvesting
Manufacturing workstation ws-001 was compromised through a coordinated multi-stage attack involving DameWare deployment via SMB, execution of a purpose-built registry toolkit targeting 186 security tool keys, and successful establishment of persistence and credential harvesting infrastructure.
Time and cost estimates are based on a Tier-2 SOC analyst model and actual investigation telemetry. Individual results vary by analyst experience, tooling, and environment.
Initial Signal
CrowdStrike Falcon detected a suspicious registry modification on manufacturing workstation ws-001 (10.1.1.1) when the process regedit.exe executed with the command line `regedit.exe "C:\[CUSTOM_DIR_1]\001.reg"` at 09:07:35 UTC on March 11, 2026. This maps to MITRE technique T1547.001 (Registry Run Keys / Startup Folder), a persistence mechanism.
What made this alert stand out was not just the registry change itself, but the artifact: a .reg file located in a non-standard directory (`C:\[CUSTOM_DIR_1]\`) with a systematic naming convention (001.reg). The file triggered 73 alerts in rapid succession, revealing a purpose-built attack toolkit targeting 186 specific CrowdStrike Falcon and AMSI registry keys, along with successful registrations of a Password Filter DLL (T1174) and accessibility API ASEP modifications (T1546.008).
Investigation correlated CrowdStrike Falcon and Microsoft Defender telemetry over 11 minutes 35 seconds, uncovering a multi-stage attack: DameWare Mini Remote Control deployed via SMB at ~00:55 UTC, followed by network discovery commands, and finally the coordinated persistence and credential theft attack via the 001.reg toolkit. The workstation was also used as a pivot point for RDP lateral movement to internal hosts 10.1.1.3 and 10.1.1.4 over multiple days.
The Questions We Asked
What follows is the path the agent walked to reach its verdict. Pivots and dead ends both made the cut. Routine steps that just ruled out the obvious are grouped together so you can skim past them.
Did anyone already triage this?
Negative findingSix checks, mostly ruling out benign explanations.
[CUSTOM_DIR_1]\ that attempts to disable CrowdStrike Falcon sensor, register credential-harvesting Password Filter DLLs, and establish persistence via Run keys and accessibility API hooks - all MITRE ATT&CK techniques associated with adversary activity, completely outside any expected role scope for a manufacturing workstation user (user_1)Did anything actually stop it?
PivotWhat CrowdStrike Falcon alerts contain this Device ID?193 recordsRegistryPersistEdit T1547.001, PasswordFilterDLL T1174, AccessibilityApiGenericAsepModified T1546.008) were NOT blocked - they were only detected, meaning those registry changes may have succeededDo we have enough to call it?
What CrowdStrike Falcon alerts contain this Device ID?193 recordsIs malware actually present on the system?
PivotWhat Windows binaries were executed from non-standard paths on this device according to CrowdStrike Falcon Next-Gen SIEM?9 recordsDismHost.exe, dwDrvInst.exe, CitrixReceiverUpdater.exe) are legitimate software components. DameWare is a legitimate remote management tool. No confirmed malware samples were identified in the binary execution data.regedit.exe used to import 001.reg appears to be the legitimate Windows binary - the attack uses Living off the Land (LOTL) techniques via a malicious .reg file rather than deploying compiled malware executablesT1174) was registered via the 001.reg import - this is a malicious DLL designed to intercept and harvest Windows credentials. A DLL registered as a password filter IS malicious software.Did an authorized user knowingly do this?
PivotWhat CrowdStrike Falcon alerts contain this Device ID?193 records10.1.1.4 and 10.1.1.3) over multiple days suggests the compromised machine is being used as a pivot point by an attacker, not routine activity by an authorized userThree checks, mostly ruling out benign explanations.
Did the attack actually succeed?
PivotWhat CrowdStrike Falcon alerts contain this Device ID?193 recordsnet.exe session, whoami /groups), persistence via Run key (RegistryPersistEdit), credential harvesting DLL (PasswordFilterDLL), and accessibility API ASEP modification - these constitute successful unauthorized access with actions executedWas malware actually executed?
PivotWhat Windows binaries were executed from non-standard paths on this device according to CrowdStrike Falcon Next-Gen SIEM?9 recordsDismHost.exe, CitrixReceiverUpdater.exe, dwDrvInst.exe) are legitimate software components; no confirmed compiled malware executables were identified in the binary execution data. The attack primarily used Living-off-the-Land techniques (regedit.exe, cmd.exe, net.exe, whoami.exe) with a malicious .reg configuration file.T1174 - a technique requiring a malicious DLL to be registered in LSA), suggesting a DLL payload was deployed as part of the attackKey Pivots
Detection Opportunities
The high-fidelity detection signals from this investigation, sanitized for general use. Each MITRE ID links to the official technique reference.
RegistryPersistEditPasswordFilterDLLAccessibilityApiGenericAsepModifiedServiceExecOnSMBFile| Technique | Tactic | Context |
|---|---|---|
T1547.001Registry Run Keys / Startup Folder | Persistence | Flag regedit.exe or reg.exe importing .reg files from paths outside C:\Windows and C:\Program Files. Alert on bulk imports touching more than 10 registry keys in one process lifetime, especially targeting HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run or HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. The legitimate ways to change Run keys go through MDM or GPO, not interactive regedit. |
T1174Credential Dumping | Credential Access | Monitor for registry modifications to HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Notification Packages or HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Authentication Packages that register new DLL files. Alert on any Password Filter DLL registration outside of vendor-approved paths. Correlate with process execution to identify which process triggered the registration. |
T1546.008Accessibility Features | Persistence | Monitor modifications to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options and accessibility-related registry paths (Sticky Keys, Magnifier, Narrator, On-Screen Keyboard). Alert when these are modified to point to non-standard executables or DLLs. Legitimate accessibility changes are rare and typically deployed via GPO. |
T1570Lateral Tool Transfer | Lateral Movement | Flag service execution or process creation from SMB-mounted shares (\\\\server\\share paths). Alert on execution of .exe or .dll files from remote SMB paths, especially admin shares (C$, ADMIN$, IPC$). This pattern is characteristic of attackers deploying tools via SMB lateral movement rather than legitimate software distribution. |
Verdict Reasoning
The verdict of Compromised at high confidence rests on the following mutually corroborating signals:
1. CrowdStrike Falcon telemetry provides detailed, corroborated evidence of all attack stages—process trees, command lines, registry keys, and disposition results—with 193 high-severity alerts across multiple MITRE techniques
2. The 'Detection, standard detection.' disposition on RegistryPersistEdit, PasswordFilterDLL, and AccessibilityApiGenericAsepModified alerts definitively confirms those actions were not blocked by Falcon, meaning the persistence mechanisms succeeded
3. The ServiceExecOnSMBFile alert confirms DameWare Mini Remote Control was deployed via SMB admin shares, a hallmark of attacker lateral movement rather than authorized software deployment
4. The purpose-built nature of the 001.reg file—targeting 186 specific Falcon/AMSI registry keys in a single execution—demonstrates deliberate adversarial intent; no legitimate software deployment would construct such a toolkit. Confidence is High (not Confirmed) because the attacker's initial access vector (how they first compromised the network or obtained credentials) and the actual file path and hash of the Password Filter DLL are not fully determined from available telemetry, leaving a gap in the complete attack chain
Lessons
- 01A high block-rate is not containment. In this investigation, 186 blocked tamper attempts against the Falcon sensor looked like a win. The three unblocked primary objectives (Run key persistence, Password Filter DLL registration, accessibility hooks) completed in the same execution. Always audit what did NOT get blocked, not just what did—the blocked count is the distractor. The attacker's secondary goal (disabling Falcon) failed; the primary goals (persistence and credential theft) succeeded.
- 02Purpose-built attack toolkits reveal deliberate intent. The
001.regfile targeting 186 specific Falcon/AMSI registry keys demonstrates this was not opportunistic malware or a generic attack. An attacker spent time building a custom toolkit for this environment. When you see a .reg file with dozens or hundreds of specific registry modifications, especially targeting security tools, treat it as a strong signal of a sophisticated, targeted campaign rather than commodity malware. - 03SMB-based service execution is a lateral movement red flag. The ServiceExecOnSMBFile alert for DameWare deployment is a hallmark of attacker lateral movement, not authorized software distribution. Legitimate software deployments use MDM, GPO, or signed distribution channels. If you see services or processes executing from SMB shares (
\\\\server\\share\\executable.exe), especially admin shares, escalate immediately—this is how attackers move between systems. - 04Credential harvesting infrastructure succeeding is worse than persistence. The Password Filter DLL registration (
T1174) that was not blocked means the attacker can now intercept every password change on this workstation. This is worse than persistence alone because it gives the attacker ongoing access to credentials. When you seeT1174alerts with 'Detection, standard detection.' disposition, treat it as a critical compromise requiring immediate credential rotation for affected users. - 05Multi-day lateral movement indicates dwell time, not exploration. The RDP connections from
ws-001to10.1.1.3and10.1.1.4over multiple days (March 8–10) before the final attack on March 11 show the attacker was already established and moving laterally. This wasn't a one-shot attack; it was a campaign with reconnaissance and staging phases. Early detection of the DameWare deployment could have prevented the subsequent persistence and lateral movement.