heroui logo

Windows Modify Registry UpdateServiceUrlAlternate

Splunk Security Content

View Source
Summary
The detection rule 'Windows Modify Registry UpdateServiceUrlAlternate' targets suspicious modifications to the Windows Update service registry configuration, specifically focusing on the 'UpdateServiceUrlAlternate' key. By leveraging Sysmon EventIDs 12 and 13, the rule identifies potentially malicious changes made to this registry key path, which is often exploited by malware, including RedLine Stealer, to bypass detection mechanisms and facilitate further malicious activities. Such alterations could redirect update services, leading to the execution of unauthorized code, systemic compromise, and evasion of security controls. Proper monitoring and alerting on these registry modifications are essential for maintaining endpoint security, as they could indicate underlying malicious intent or activity when observed in the context of an infection or breach.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1112
Created: 2024-11-13