
Summary
This rule detects unauthorized modifications to the Windows Registry aimed at disabling the 'Run' application found in the Start menu. Specifically, it highlights changes made to the registry key located at '*\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoRun', where a value of '0x00000001' is set. Disabling the 'Run' application can significantly impair a user's ability to execute programs efficiently and may indicate malicious intent, especially in the context of malware persistence and obfuscation. The detection leverages information captured by Sysmon's EventID 12 and 13, which record registry activities, making it crucial for incident response teams to be aware of this behavior. Potential false positives exist when administrators intentionally disable the 'Run' feature for security reasons.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Script
ATT&CK Techniques
- T1562.001
- T1562
- T1112
Created: 2024-12-08