
Summary
This detection rule is designed to identify potential persistence mechanisms that utilize the Windows registry, specifically targeting the GlobalFlags and SilentProcessExit keys as part of an attacker's strategy. By monitoring modifications in the registry under the paths 'GlobalFlag' and 'SilentProcessExit', this rule aims to flag suspicious activities that could indicate an effort to achieve privilege escalation or maintain persistence on a compromised system. The rule employs a selection condition that requires at least one of the specified registry entries to match, indicating the presence of potentially malicious alterations. The use of GlobalFlags can hide the execution of processes and manage the behavior of applications, making it an attractive method for attackers to obscure their presence. This detection is critical for enhancing endpoint security and defending against advanced evasion tactics.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2018-04-11