
Summary
This detection rule identifies modifications to the WinSock2 autorun keys in the Windows Registry, specifically targeting changes made to the Autostart Extensibility Point (ASEP). The rule looks for registry alterations in `\System\CurrentControlSet\Services\WinSock2\Parameters` and associated protocol and namespace catalog entries. It employs a filtering mechanism to distinguish between potentially malicious modifications and legitimate activities, such as those performed by legitimate software or system administrators. When the specified conditions are met, it logs relevant security information, including the Security ID and the types of values modified. This detection is crucial in combatting persistence techniques exploited by threat actors to establish or maintain control over infected systems.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1547.001
Created: 2019-10-25