
Summary
The 'Screensaver Event Trigger Execution' analytic is designed to detect changes made to the SCRNSAVE.EXE registry entry. Modifications to this registry key can indicate that an attacker is attempting to use screensaver settings as a method for persistence or privilege escalation, a known tactic employed by advanced persistent threat (APT) groups and malware. The detection rule monitors relevant registry activity through Sysmon Events 12 and 13, capturing changes to the specified registry path. If an alteration is legitimate, it might lead to an attacker executing arbitrary code with elevated privileges, potentially allowing further system compromise. As this technique is recognized within the cybersecurity community, leveraging the MITRE ATT&CK framework references T1546 and T1546.002 enhances the contextual understanding of these activities.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1546
- T1546.002
Created: 2024-11-13