
Summary
This detection rule focuses on monitoring changes to the NGenAssemblyUsageLog registry key, a critical component related to the .NET Framework and its Just-In-Time (JIT) compilation behavior. The NGenAssemblyUsageLog key can be manipulated to divert the .NET Usage Log's output away from its expected location. This kind of tampering could be leveraged by attackers seeking to bypass detection mechanisms and obfuscate their actions during a .NET application runtime. By altering this registry key, an attacker can prevent the creation of legitimate usage logs, which are instrumental in tracking application behavior and detecting anomalies. The rule aims to capture any unauthorized modification attempts to this specific registry path, allowing organizations to respond to potential evasion tactics employed by malicious actors.
Categories
- Windows
Data Sources
- Windows Registry
Created: 2022-11-18