
Summary
This detection rule targets potential persistence mechanisms via the Disk Cleanup Handler in Windows operating systems. Attackers may manipulate the registry to add or modify cleanup handler entries, specifically under the path \SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\. The rule indicates that the presence of certain entries such as \Autorun might indicate an unauthorized attempt to ensure that malicious scripts or programs execute upon system startup or during cleanup operations. The rule inspects both the presence of the Autorun registry entry and the existence of suspicious command strings associated with known scripting engines (e.g., cmd, PowerShell, rundll32) that could signal malicious activity intended to maintain post-exploitation presence.
Categories
- Windows
- Endpoint
- Infrastructure
Data Sources
- Windows Registry
Created: 2022-07-21