heroui logo

Windows Modify Registry DisAllow Windows App

Splunk Security Content

View Source
Summary
The detection rule titled 'Windows Modify Registry DisAllow Windows App' focuses on identifying modifications made to the Windows registry that could prevent specific applications from executing. This is achieved by monitoring the registry path for values indicating disallowed runs through the Endpoint.Registry datamodel. The rule is particularly relevant for detecting attempts to disable security controls, as is often a tactic used by malicious software such as Azorult. The detection is triggered whenever the registry value at 'HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun' is set to '0x00000001', implying that certain applications are being deliberately blocked from running. This may be indicative of malicious activity aimed at maintaining persistence and evading detection. Should this activity be confirmed as hostile, it is essential for security teams to respond promptly to mitigate potential threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1112
Created: 2024-11-13