
Summary
This rule is designed to detect suspicious activity where the Windows executable 'reg.exe' is used to modify registry keys related to the desktop background. Such modifications are typically characteristic of various forms of malware, especially ransomware, which may change the desktop background to display ransom notes or other types of unwanted content. The detection criteria include specific command line parameters to identify when 'reg.exe' is invoked to alter desktop-related registry entries. The rule outlines conditions that must be met, such as the presence of certain keywords in the command line that correspond to known registry paths associated with desktop wallpaper settings. In particular, the detection focuses on commands that enforce restrictions on changing the desktop wallpaper as well as changes to the wallpaper itself. The context provided within the rule highlights common usage scenarios, both legitimate and malicious, underlining the necessity for careful analysis of such system-level changes. General preventive measures against such threats may include monitoring administrative scripts that could unjustifiably change background settings.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2023-12-21