heroui logo

Modification Of Wallpaper

Splunk Security Content

View Source
Summary
This detection rule monitors changes to specific Windows registry keys associated with desktop wallpaper settings, specifically "Control Panel\\Desktop\\Wallpaper" and "Control Panel\\Desktop\\WallpaperStyle". It utilizes Sysmon EventCode 13 to capture any modifications made to these keys. The criteria for detection include alterations by processes other than explorer.exe and alterations occurring through suspicious file paths like temporary or public directories. This behavior is particularly noteworthy as it may correlate with ransomware activities, notably from strains such as the REVIL ransomware, which is known for changing desktop wallpapers to display ransom notes. Identifying such activity can serve as an indicator of a possible ransomware infection that may lead to data encryption and extortion.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1491
Created: 2024-11-13