
Summary
This detection rule focuses on identifying potential persistence mechanisms in Windows applications by monitoring for the setting of the `REGISTERAPPRESTART` compatibility layer through the Windows Registry. The rule is specifically designed to catch instances where applications utilize the `RegisterApplicationRestart` API, which can be exploited by malicious actors to ensure that their applications persist across reboots or user sessions. The rule checks for modifications in the registry key that pertains to application compatibility flags, indicating that an application is requesting restart capabilities. Since this functionality can be abused for persistence, it is flagged as a medium-risk threat, although there are legitimate scenarios where applications might use this feature for compatibility purposes. The detection logic specifically targets the registry path associated with application compatibility and looks for the `REGISTERAPPRESTART` indicator. This rule allows for heightened vigilance against unauthorized persistence behaviors without overly cluttering logs with legitimate activities.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2024-01-01