
Summary
The rule titled 'Remote Registry Lateral Movement' is designed to detect instances of lateral movement behaviors that exploit the remote procedure call (RPC) interface to interact with the Windows registry. Specifically, it monitors for RPC calls that modify the registry and potentially lead to code execution on remote machines. The detection relies on the installation and proper configuration of an RPC Firewall, which is set to log and intercept specific RPC calls defined by a unique UUID. The rule triggers on Event IDs relevant to these RPC interactions, by listening for specific operation numbers associated with registry modification actions. False positives can occur, especially during legitimate remote administration tasks where registry values are modified for maintenance or configuration purposes. The level of alert generated by this rule is classified as 'high', indicating the potential risk associated with unauthorized registry access and modification, which can be indicative of malicious lateral movement within a network.
Categories
- Network
- Endpoint
- Windows
Data Sources
- Process
- Application Log
Created: 2022-01-01