
Summary
This detection rule focuses on identifying a persistence mechanism utilized by attackers involving the modification of the Windows registry, specifically targeting the 'hhctrl.ocx' (Help and Support Control ActiveX control). Attackers may alter the registry key associated with 'hhctrl.ocx' to create a means for executing their own malicious binaries. The rule targets the modification of the registry value under the CLSID for 'hhctrl.ocx' where malicious payloads could be pointed instead of the legitimate handler. By monitoring the registry for changes to this specific key and value, the detection aims to catch such attempts to gain persistence on a compromised Windows system. The detection rule defines the conditions under which an alert is triggered: if the target object contains a specific registry path indicating unauthorized modifications, and if the details do not match the expected legitimate path for 'hhctrl.ocx'. This makes it a valuable detection method for identifying potential persistence threats on Windows systems, assisting in swift incident response efforts.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2022-07-21