
Summary
This detection rule identifies modifications made to the registry keys associated with 'MyComputer' in Windows systems, particularly the 'Default' value of any subkey under \Microsoft\Windows\CurrentVersion\Explorer\MyComputer. Such modifications could indicate attempts at persistence mechanisms used by attackers to ensure that a malicious binary is executed whenever a particular user action occurs. The rule captures changes to potentially redirect actions to a custom binary, which is common in persistence strategies employed by malware. The detection logic focuses on identifying registry writes where the target object relates to 'MyComputer' and ends with '(Default)'. This rule is crucial for monitoring malicious activities aiming to persistently control user actions and maintain a foothold within the system. Users and security teams should be aware of the potential for these registry manipulations when assessing the integrity of their systems.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
Created: 2022-08-09