
Summary
This detection rule targets potential persistence mechanisms that involve the registration of a new Netsh helper DLL from suspicious locations on a Windows system. Netsh (Network Shell) is a command-line utility used for network configuration, and the registration of new helper DLLs can be a sign of malicious activity intended to maintain access or execute commands without detection. The rule specifically monitors changes in the Windows registry under the path '\SOFTWARE\Microsoft\NetSh', which is where such persistent registrations typically occur. It identifies suspicious file paths that are commonly used by attackers, including directories like 'C:\Perflogs\', 'C:\Users\Public\', 'C:\Windows\Temp\', and other user-specific temporary files. If a DLL is registered in one of these specified directories, it raises an alert indicating a potential security threat. This rule can aid in detecting malware that leverages legitimate Windows functionality to gain persistence on the system.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
Created: 2023-11-28