heroui logo

Windows Disable Notification Center

Splunk Security Content

View Source
Summary
This detection rule monitors changes to the Windows registry specifically targeting the disabling of the Notification Center, a known tactic used by Remote Access Trojans (RATs) to evade detection and mask their activities. The rule is implemented through the analysis of Sysmon logs (EventID 12 and 13) which capture significant registry modifications. By focusing on the 'DisableNotificationCenter' registry value, which should be set to '0x00000001' when disabled, this rule seeks to identify potentially malicious actions that could lead to greater system compromise and data theft. Administrators can implement the detection requiring Sysmon logs and will need to account for potential false positives from legitimate user actions.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
ATT&CK Techniques
  • T1112
Created: 2024-12-08