
Summary
The 'Windows Modify Registry WuServer' detection rule is designed to identify potentially malicious modifications to the WUServer registry settings on Windows systems. This rule leverages events captured by Sysmon, specifically EventID 12 and EventID 13, to monitor changes in the registry path related to Windows Update configurations. Adversaries, including malware like RedLine Stealer, have been known to exploit registry modifications to bypass security measures, make undetected changes, and deploy further payloads. To facilitate detection, the analytic processes registry events looking for alterations to the path '*\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\WUServer'. If such a modification is observed, cross-referencing with the context of the user and other registry values allows for determining the legitimacy of the change. The implementation requires proper logging configurations, where the endpoint processes capturing these registry changes are integrated into the 'Endpoint' datamodel. In production status, false positives can occur if administrators intentionally modify these settings. Therefore, careful review is essential to confirm the actual threat level before escalating detections.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1112
Created: 2024-11-13