
Summary
This detection rule identifies the creation of new file associations that exploit the 'exefile' handler within Windows Registry settings. This behavior is commonly associated with attacks that aim to bypass security mechanisms by allowing malicious executables to be triggered through altered file associations. The rule monitors registry changes specifically looking for entries that indicate an association involving 'exefile', utilizing the 'TargetObject' field to identify relevant registry paths. By focusing on the presence of 'Classes\.' in the registry modifications, the rule helps safeguard against potential threats where malicious files can be executed through deceiving file types. Unauthorized alterations of these file associations can enable attackers to execute harmful payloads without alerting users to the risk, thus necessitating proactive monitoring and detection efforts.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Logon Session
Created: 2021-11-19