heroui logo

Add Debugger Entry To AeDebug For Persistence

Sigma Rules

View Source
Summary
This detection rule aims to identify instances where an attacker modifies the Windows registry to establish persistence via the 'AeDebug' key. The 'AeDebug' key is utilized by Windows to define the debugger that is executed when an application crashes. Attackers may exploit this feature by adding a 'Debugger' value that points to a malicious DLL. The detection logic looks for modifications in the registry where the target object contains the path to the 'AeDebug' key and the details end with '.dll', indicating a debugger payload. If such a registry modification occurs but is not accompanied by a standard debugger invocation filter, the rule triggers an alert. Given that this key may also be legitimately configured for development purposes, a potential false positive scenario exists, particularly on developer machines. Therefore, this rule focuses on detecting suspicious alterations while accounting for legitimate use cases that could arise in software development environments.
Categories
  • Windows
Data Sources
  • Windows Registry
Created: 2022-07-21