
Summary
The 'Registry Explorer Policy Modification' rule is designed to detect unauthorized changes made to specific Windows registry keys that disable functionalities within Windows Explorer. Threat actors, particularly those using malware such as Agent Tesla, may employ this technique to hinder users' ability to log off, access system functions, or utilize other Explorer capabilities. The rule focuses on monitoring modifications to keys under the path 'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer', targeting various values that, when set to a DWORD of 1, prevent access to features such as the Control Panel, desktop, and taskbar options. The detection mechanism checks for any such modifications and triggers an alert when the specified conditions are met, thus enabling a defensive layer against potential exploitation of these settings. Administrators should be cautious of false positives, such as legitimate administrative scripts that may also attempt to adjust these registry settings for maintenance purposes. Overall, this rule plays an essential role in identifying and mitigating risks posed by malware that manipulate system functions via registry entries.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
ATT&CK Techniques
- T1112
Created: 2022-03-18