
Summary
This detection rule focuses on tracking changes made to the Internet Explorer security zones through modifications in the Windows registry. Specifically, it monitors actions that involve adding domains to the trusted sites zone, which can be an indication of persistence strategies employed by malicious actors. By observing specified registry paths, this rule helps in identifying suspicious activities that might be aimed at manipulating Internet Explorer's security settings, potentially allowing malware or unauthorized content to be executed in a more permissive security environment. The rule defines specific conditions that must be met for a change to be considered pertinent, filtering out benign changes typically made by administrative scripts. This detection is crucial as oversight in domain zone changes may lead users to inadvertently enable vulnerability exploits, making the investigation of such activities important for security hygiene.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1112
Created: 2022-01-22