
Summary
This detection rule monitors for the addition of root CA certificates in Windows registry through specific registry paths related to certificates and specific registry values named 'Blob'. The analytic leverages data from the Endpoint datamodel by capturing Sysmon events (EventID 12 and EventID 13) indicative of registry modifications. This activity could suggest a compromise, as unauthorized root CA certificates might enable man-in-the-middle attacks or intercept sensitive communications. The detection is crucial as it ensures the integrity of encryption standards and data security within the endpoints.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1553.004
- T1553
- T1587.002
Created: 2025-01-21