
Summary
This detection rule has been designed to identify suspicious modifications made to Windows registry settings that are commonly leveraged by attackers, particularly ransomware, to hide critical notification features on compromised systems. By monitoring specific registry paths and values, the analytic identifies when a registry value indicating the concealment of system notifications is set to '1', suggesting a malicious intent. This is significant in the context of ransomware as it prevents victims from receiving system alerts, facilitating prolonged attacker persistence. Utilizing the Endpoint.Registry data model and Sysmon events, the detection enables security teams to analyze registry changes that could indicate an attack, thereby enhancing visibility into potential threats in their network environment.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- User Account
ATT&CK Techniques
- T1112
Created: 2024-12-08