
Summary
The 'Windows Modify Registry wuStatusServer' rule focuses on identifying unauthorized modifications made to the Windows Update configuration found in the registry, specifically the WUStatusServer key. This rule analyzes data collected from Sysmon Event IDs 12 and 13, which capture registry changes associated with endpoint security. Such changes are particularly concerning, as they can indicate attempts by threat actors, notably malware such as RedLine Stealer, to manipulate Windows Update settings to bypass security mechanisms and deploy malicious payloads. The ability to alter update settings is critical for attackers aiming to maintain persistence on compromised systems and evade detection. The search query makes use of the Endpoint data model's Registry dataset to trace modifications in the specific registry path associated with WUStatusServer. Any identified changes trigger alerts for potential investigation and threat mitigation.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
ATT&CK Techniques
- T1112
Created: 2024-11-13