
Summary
This detection rule is designed to identify persistence mechanisms associated with the Windows 10 Narrator's Feedback-Hub by analyzing Windows Registry events. Specifically, it focuses on detecting alterations to registry values that are crucial for the Narrator application's functionality, indicating possible malicious intent to maintain presence on the system. The rule targets events where specific registry keys related to the Narrator's command are deleted, making it useful for identifying potential abuse of accessibility features for persistence. Given that the attack vector involves registering malicious commands that may trigger unwanted behaviors, monitoring these registry changes helps in early detection of insider threats or malware leveraging accessibility elements to remain undetected.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2019-10-25