heroui logo

CurrentVersion Autorun Keys Modification

Sigma Rules

View Source
Summary
This detection rule monitors modifications made to autostart extensibility points (ASEPs) within the Windows registry, specifically targeting entries located in the `\SOFTWARE\Microsoft\Windows\CurrentVersion` path. The rule identifies various keys related to programs that are allowed to execute automatically when a user logs in, including entries under the \Run, \RunOnce, and related entries. Given its focus on registry modifications, this detection is relevant for identifying potential persistence mechanisms employed by malware. The rule employs a comprehensive set of filters to exclude legitimate applications and processes from triggering alerts. It is crucial to ensure that it minimizes false positives by allowing settings that are typically modified without malicious intent. Overall, this rule is part of a broader strategy to detect unauthorized or malicious changes to critical registry entries that can enable persistence in compromised environments.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
ATT&CK Techniques
  • T1547.001
Created: 2019-10-25