heroui logo

Suspicious ScreenSave Change by Reg.exe

Sigma Rules

View Source
Summary
This detection rule identifies suspicious changes to screensaver settings made by the Windows Registry Editor (reg.exe), a common method adversaries may use to establish persistence by modifying these settings. Screensavers can execute malicious programs when a user is inactive, allowing an attacker to maintain control or perform tasks covertly. The detection logic specifically looks for registry changes related to the activation of screensavers, their timeout settings, and whether the screensaver is secured. Multiple command-line patterns are analyzed to catch various malicious attempts that interact with the registry to adjust these settings. An alert is triggered when the tool reg.exe changes any of the screensaver registry values, thus indicating possible malicious activity.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1546.002
Created: 2021-08-19