
Summary
This detection rule identifies suspicious RUN keys that are created by software located in certain potentially unsafe directories, specifically the Download folder or temporary file folders associated with Outlook and Internet Explorer. These directories are common locations for the download of unverified or potentially malicious applications. The rule inspects registry events on Windows systems, particularly monitoring changes to the Run key (located at `HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run`) to uncover any entries created by applications residing in the Downloads or designated temporary internet directories. Given that malicious actors often leverage such techniques to ensure persistence on a system, this rule is crucial for detecting such activities early, allowing for timely alerts and remediation actions. False positives may arise from legitimate software installers that users intentionally download and execute, which must be taken into consideration when implementing this rule.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
Created: 2019-10-01