
Summary
This rule is designed to detect modifications made to the autostart extensibility points (ASEP) specifically within the Windows registry's Wow6432Node. It targets the pathway `\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion` to observe changes in various autostart-related registry keys such as `Run`, `RunOnce`, and `ShellServiceObjectDelayLoad`, among others. These keys are associated with software that is configured to run automatically when the system starts, making them a common target for malware seeking persistence. The detection logic includes specific filters to exclude entries that may be related to legitimate applications like Microsoft Office installers and updates, Microsoft Edge, and Dropbox, to reduce false positives. Given its focus on registry manipulation, the rule is most applicable in environments that utilize Windows as the primary operating system and is flagged at a medium priority level for incident response teams. Its effectiveness relies on continuous monitoring of changes in the specified registry paths, allowing early detection of potential unauthorized modifications that could indicate malware activity.
Categories
- Windows
- Endpoint
- Infrastructure
Data Sources
- Windows Registry
ATT&CK Techniques
- T1547.001
Created: 2019-10-25