heroui logo

Windows Modify Registry Utilize ProgIDs

Splunk Security Content

View Source
Summary
This detection rule identifies anomalous modifications made to the Windows Registry, particularly focusing on Programmatic Identifier (ProgID) associations. These modifications can be indicative of attempts to bypass User Account Control (UAC) features in Windows, which malicious actors may exploit, notably malware such as ValleyRAT. ValleyRAT may manipulate registry entries associated with specific file types, like `.pwn`, to facilitate the execution of harmful scripts or commands when users open these files. By continuously monitoring for deviations in registry keys related to ProgIDs, this rule enables security analysts to detect potential malicious activity earlier, thus aiding in the prevention of unauthorized executions and further exploitation of the system.
Categories
  • Windows
  • Endpoint
Data Sources
  • Pod
ATT&CK Techniques
  • T1112
Created: 2024-11-13