heroui logo

Code Signing Policy Modification Through Registry

Elastic Detection Rules

View Source
Summary
This rule identifies attempts to disable the code signing policy through modifications in the Windows registry, particularly the 'BehaviorOnFailedVerify' key. Code signing is a critical security feature in Windows that ensures drivers and executable files have not been tampered with and come from trusted sources. Disabling this feature can expose the system to malicious actors who may load unsigned or self-signed drivers leading to security vulnerabilities. The detection query focuses on tracking changes to the registry, looking specifically for values that indicate the code signing policy is being altered. The rule classifies these events with a medium-risk score and correlates with multiple tactics and techniques under the MITRE ATT&CK framework, including modifying registry values and subverting trust controls. Additionally, it provides detailed triage steps, false positive analysis, and response actions to ensure the integrity of the system.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Network Share
  • Application Log
  • Logon Session
ATT&CK Techniques
  • T1112
  • T1553
  • T1553.006
Created: 2023-01-31