heroui logo

Windows Modify Registry EnableLinkedConnections

Splunk Security Content

View Source
Summary
The detection rule 'Windows Modify Registry EnableLinkedConnections' identifies suspicious changes to the Windows registry concerning the 'EnableLinkedConnections' setting, specifically when it is modified to '0x00000001'. This change is significant because it can grant unauthorized access to network shares, leveraging both standard and administrator privileges, a technique frequently exploited by certain types of malware, including variations of ransomware like BlackByte. The rule utilizes Sysmon EventID 12 and EventID 13 to monitor registry changes through the Endpoint.Registry data model. The given Splunk search query assesses events regarding the modification of this particular registry key within a one-hour span, extracting relevant details such as timestamps and process IDs, thus offering comprehensive visibility into potential malicious activities.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1112
Created: 2025-01-21