
Summary
The detection rule identifies potentially malicious modifications to the Windows registry that configure default security zone settings for HTTP and HTTPS protocols, aligning them with the local machine or 'My Computer' zone. Threat actors may exploit these modifications to elevate the trust level for untrusted websites, treating them with the same permissions as local files. This situation can lead to increased vulnerability, as it permits web content to execute with elevated privileges on the endpoint, risking the integrity and security of the system. The Splunk logic captures changes to the registry path associated with Internet Settings and analyzes any discrepancies that suggest an attacker is manipulating security settings. Such actions are indicative of common tactics employed by malicious actors to evade detection and launch attacks without alerting security protocols.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1112
Created: 2024-02-09