
Summary
This detection rule focuses on monitoring changes to the Windows Registry, specifically targeting the User Shell Folders startup key. This Registry key can be modified by malicious actors to redirect startup paths, potentially to locations where harmful payloads are stored. By detecting such modifications, it becomes possible to ascertain whether an unauthorized change has been made that could indicate an attempt to establish persistence on the system, thereby raising the potential for privilege escalation as well. The rule checks for any entries that match specific criteria within the TargetObject of the registry, ensuring that only relevant changes to the Startup key are flagged.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1547.001
Created: 2022-10-01