heroui logo

Add DisallowRun Execution to Registry

Sigma Rules

View Source
Summary
This detection rule identifies when the DisallowRun registry key is set to prevent the execution of specific programs on Windows operating systems. The rule specifically monitors the registry path: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun and looks for a DWORD value of 1. Setting this value to 1 indicates the administrator's intention to disallow certain executables from being launched, potentially used in defensive strategies against malicious software. Proper alerts based on this setting may indicate that a policy change was made that could affect application whitelisting strategies, as this could indicate an attempt for defense evasion or the implementation of additional security measures by an organization or an attacker attempting to exert control over system operations.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Windows Registry
ATT&CK Techniques
  • T1112
Created: 2022-08-19