heroui logo

Windows Snake Malware Registry Modification wav OpenWithProgIds

Splunk Security Content

View Source
Summary
This detection rule focuses on modifications to the Windows registry path `*.wav\OpenWithProgIds`, which is specifically linked to the Snake Malware campaign. The rule utilizes Sysmon Event IDs 12 and 13 to monitor changes in this registry location, an action which is crucial as the Snake malware (notably its `WerFault.exe` component) leverages this path for decrypting critical encryption keys needed for its operations. Any unauthorized changes detected here could signify an attempt to load and execute Snake's kernel driver, potentially granting attackers persistent access and control over the affected system. It is essential for organizations to monitor this activity to mitigate the risks associated with such modifications and to respond rapidly to potential compromises.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1112
Created: 2024-11-13