heroui logo

Potential Ransomware Activity Using LegalNotice Message

Sigma Rules

View Source
Summary
This detection rule aims to identify potential ransomware activity by monitoring changes to specific Windows registry values associated with legal notice messages. It specifically looks for modifications to the 'LegalNoticeCaption' and 'LegalNoticeText' registry entries, which can often be used by ransomware to display ransom messages to victims. The rule is triggered when these registry values contain keywords commonly found in ransom demands, such as 'encrypted', 'Unlock-Password', and 'paying'. By focusing on these particular registry modifications, security teams can detect early signs of ransomware behavior, allowing for a timely response to mitigate potential damage.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
ATT&CK Techniques
  • T1491.001
Created: 2022-12-11