
Summary
This detection rule identifies potential persistence mechanisms employed by attackers using Appx DebugPath modifications in the Windows registry. Targeting the registry's `ActivatableClasses` and `PackagedAppXDebug`, it looks for suspicious entries indicating that someone may have manipulated debugger paths to maintain access or control of a system. The rule assesses specific registry values that should not typically contain debug configurations for installed applications, alerting if any entries deviate from expected norms, which may suggest an ongoing compromise or attempt at persistence. The criteria include detecting registry entries that either contain or end with certain patterns indicative of malicious activity, enabling security teams to respond to potential threats promptly.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2022-07-27