
Summary
This detection rule identifies potential malicious modifications to the Windows registry, specifically targeting the 'Run' key for automatic startup processes. It focuses on alterations made by the WINEKEY or TEAM9 backdoors, which are known for their persistence techniques in compromising systems. The detection logic leverages the registry path 'Software\Microsoft\Windows\CurrentVersion\Run\Backup Mgr', monitoring for any registry events that indicate the presence of these backdoor modifications. The rule is categorized under high severity due to the critical nature of unauthorized changes in startup entries, which could indicate a compromise that allows persistent malware execution upon system boot.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2020-10-30