
Summary
This detection rule identifies modifications in the Windows registry related to the storage of encoded portable executables. By tracking changes to the registry, specifically searches for strings that match a known encoded pattern ('TVqQAAMAAAAEAAAA*'), the rule aims to uncover potential attempts at defense evasion by adversaries. Cybercriminals may hide malicious content in the registry as an obfuscation tactic to avoid detection by conventional file scanning methods that inspect disk storage. Therefore, this rule is critical in monitoring and responding to unauthorized registry changes that might indicate malicious intent.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Application Log
- Service
- Network Traffic
ATT&CK Techniques
- T1112
- T1140
Created: 2020-11-25