heroui logo

Add DefaultUser And Password In Registry

Splunk Security Content

View Source
Summary
This analytic focuses on detecting unsolicited modifications in the Windows registry that are indicative of an auto admin logon setup. Specifically, it targets changes to the registry keys at the 'SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' path, where values 'DefaultUserName' and 'DefaultPassword' are added. This behavior raises alarms due to its association with the BlackMatter ransomware, which leverages such registry alterations to regain access and control over compromised systems, allowing continued encryption tasks after a system has been rebooted in safe mode. If such changes are deemed malicious, they pose a threat to system integrity, leading to potential data breaches and operational challenges.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Script
ATT&CK Techniques
  • T1552.002
  • T1552
Created: 2024-12-08