heroui logo

Suspicious Path In Keyboard Layout IME File Registry Value

Sigma Rules

View Source
Summary
This detection rule identifies suspicious registry modifications related to the Windows Input Method Editor (IME). Attackers can exploit the IME by loading a malicious DLL when changing the keyboard layout, which requires prior registration of the DLL in a specific registry key, usually found in \Control\Keyboard Layouts\. The rule watches for any changes to the 'Ime File' registry value, which is associated with the path of the DLL. Additionally, it monitors selected atypical directories, such as common temporary folders and user profile directories, to catch potential indicators of malicious activity while ensuring that legitimate applications that need IME features are not flagged unnecessarily. The condition for the detection to trigger is the presence of the registry change along with the existence of suspicious paths in the monitored folders. False positives are possible due to legitimate software that may also interact with IME registry settings. This rule is critical as it helps in identifying potential defense evasion techniques utilized by threat actors targeting systems leveraging different input methods.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
Created: 2023-11-21