heroui logo

Windows Proxy Via Registry

Splunk Security Content

View Source
Summary
The 'Windows Proxy Via Registry' detection rule identifies modifications to Windows proxy settings using the netsh.exe command, specifically focusing on changes to the Windows registry keys related to port proxies. By monitoring Registry events captured as Sysmon EventID 12 and EventID 13, this analytic leverages the Endpoint.Registry data model to track changes in the specified registry path: '\\System\\CurrentControlSet\\Services\\PortProxy\\v4tov4\\tcp'. The detection is significant because alterations in these parameters could enable an attacker to establish persistent proxies, providing a vector for data exfiltration and further compromise of network configurations. If such behavior is identified as malicious, it raises considerable security concerns regarding potential unauthorized access and manipulation of network traffic, as well as the risk of maintaining persistence on the affected system.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Script
ATT&CK Techniques
  • T1090.001
  • T1090
Created: 2024-12-16