heroui logo

Potential Persistence Via App Paths Default Property

Sigma Rules

View Source
Summary
This detection rule focuses on monitoring changes to the 'Default' property of registry keys located in the \Software\Microsoft\Windows\CurrentVersion\App Paths\ registry. Changes to these keys may indicate attempts to establish persistence mechanisms by malicious actors. The App Paths registry entries are crucial for mapping executable file names to their fully qualified paths and can affect each application's execution environment by altering the PATH variable. As such, entries that point to potentially malicious or unusual file locations (like public user folders or temporary directories) are closely monitored. The detection identifies patterns consistent with known persistence techniques, including modifications that involve scripting environments and legitimate executables that can be misused. This rule is designed to minimize false positives by acknowledging that legitimate applications may employ similar techniques but emphasizes vigilance against unusual modifications.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2022-08-10