
Summary
This rule detects potential persistence mechanisms employed by attackers through modifying the Outlook home page settings via changes to the WebView registry keys on Windows systems. In a typical scenario, an attacker may exploit the registry to set a malicious home page URL that triggers code execution or enables persistent access, effectively establishing a backdoor through which further operations can be conducted without notice. The specific registry keys monitored include those under \Software\Microsoft\Office\ and \Outlook\WebView\, with a focus on any keys that end with \URL. The detection logic activates when changes are made to these keys, indicating potential malicious intent to achieve persistence.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2021-06-09