
Summary
This rule is designed to detect modifications to registry keys associated with Winlogon, particularly under the 'WinLogon' subkey. These modifications may indicate attempts by adversaries to inject malicious DLLs or executables that could run persistently during system startup or user logon. The specified registry keys are critical for the Windows logon process, and unauthorized changes to them can allow malware to establish a foothold within the system. The detection logic uses event codes 4103 and 4104, which indicate registry modification activities, particularly using PowerShell. The logic parses event data to track alterations to the WinLogon registry keys, capturing relevant information such as the timestamp, host, user, and the processes involved. This rule specifically responds to techniques T1547.004 related to persistence using Winlogon helper DLLs and seeks to identify potential indicators of malicious behavior as part of a comprehensive security strategy.
Categories
- Windows
Data Sources
- Windows Registry
- Process
- Logon Session
ATT&CK Techniques
- T1547.004
- T1547.001
Created: 2024-02-09