
Summary
This detection rule is designed to identify potential persistence mechanisms employed by attackers in a Windows environment. Specifically, it targets instances where a new "Debugger" value is added to the "Hangs" registry key within the Windows Error Reporting (WER) registry path. By manipulating this key, an attacker can ensure that their chosen debugger or malicious payload is executed whenever an application crashes, thus establishing a foothold on the system. This method is a part of a broader tactic employed in persistence techniques, allowing the attacker to maintain control over the compromised machine surreptitiously. The rule is instrumental in monitoring unauthorized changes to critical registry keys, thereby helping security professionals mitigate the risk of ongoing or future attacks leveraging this persistence technique.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2022-07-21