heroui logo

Sticky Key Like Backdoor Usage - Registry

Sigma Rules

View Source
Summary
This detection rule identifies the potential installation and usage of a backdoor that employs the technique of modifying registry entries for built-in accessibility tools in Windows. Specifically, it looks for changes in the Image File Execution Options (IFEO) for executables such as 'sethc.exe', 'utilman.exe', and others, that have a 'Debugger' value set. This technique allows an attacker to gain unauthorized access by manipulating these built-in tools, effectively creating a stealthy elevation of privileges without needing direct interaction with the operating system. The rule focuses on the registry event category and aims to alert security teams of any suspicious debugger registrations that could signify malicious activity.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Windows Registry
Created: 2018-03-15