heroui logo

Potential Persistence Via Netsh Helper DLL - Registry

Sigma Rules

View Source
Summary
This rule detects potential persistence mechanisms that utilize the Windows Netsh utility by monitoring changes to the Netsh registry key. Specifically, it looks for the addition of a new DLL value within the Netsh registry path. The presence of a '.dll' file in the target object can signify an attempt to exploit the Netsh helper DLL functionality for maintaining persistence on the system. This detection is critical as malicious actors may use this technique to ensure their code runs each time the Netsh utility is invoked, which is commonly overlooked in traditional security measures. By tracking these registry modifications, the rule aims to identify potential persistence threats early, allowing for timely response actions to mitigate any risks posed by unauthorized changes.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Windows Registry
Created: 2023-11-28