heroui logo

Windows Modify Registry DisableRemoteDesktopAntiAlias

Splunk Security Content

View Source
Summary
This detection rule monitors for modifications to the Windows registry key "DisableRemoteDesktopAntiAlias" specifically looking for changes that set its value to 0x00000001. Alterations to this key can indicate the presence of the DarkGate malware, which manipulates this registry setting to improve its remote access capabilities. The rule utilizes data gathered from Sysmon's EventID 12 and 13, focusing on the "Endpoint" data model, where it tracks changes in the Registry node. The detection is critical as it may signal an attacker's attempts to establish persistence and maintain control over the infected system, allowing for potential exploitation and data theft. Administrators should be aware of the possibility of false positives, especially if legitimate users modify this setting.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Logon Session
ATT&CK Techniques
  • T1112
Created: 2024-11-13