
Summary
This detection rule targets a specific method of persistence associated with the Windows Registry. It identifies when a new value is added to the 'DbgManagedDebugger' key under the .NET framework registry path. This particular mechanic is often exploited to ensure that a debugger (specifically 'vsjitdebugger.exe') is invoked when an application crashes. By embedding a debugger in the registry, an attacker can gain further control over the system and potentially maintain access post-crash, thereby thwarting some defensive mechanisms. Use cases of this technique have been documented in various literature including Hexacorn’s blog and the PersistenceSniper tool on GitHub. It is critical to monitor for this registry modification since it may signify an attempt by an attacker to establish persistence on a compromised system, rather than an intended developer action.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2022-08-07