
Summary
This detection rule identifies suspicious use of debugger registration via process creation commands, particularly targeting scenarios where a debugger is registered for applications associated with accessibility features (like sticky keys) in Windows. Such modifications can indicate the presence of a backdoor, allowing malicious users to gain elevated privileges or maintain persistence on the system. The rule specifically looks for patterns in the command-line arguments used in process creation events that mention the registry key 'Image File Execution Options' combined with known executable files for accessibility tools such as 'sethc.exe', 'utilman.exe', and others. By utilizing a combination of these checks, the rule seeks to catch attempts to exploit these accessibility functions, which could facilitate unauthorized access to the login screen, thus requiring high-level scrutiny of the environment for potential threats.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Command
Created: 2019-09-06