
Summary
This detection rule aims to identify unauthorized modifications made to the registry keys associated with the ClickOnce trust prompt behavior on Windows systems. The ClickOnce deployment technology allows users to install and run Windows-based applications by clicking a link in a web browser. However, attackers may leverage this functionality to execute malicious code by manipulating the trust settings, especially the registry key located at `\SOFTWARE\MICROSOFT\.NETFramework\Security\TrustManager\PromptingLevel\`. Changes to this key can allow installations from less trusted locations like the Internet, Local Intranet, or even from untrusted sites. The rule monitors for any changes that meet specific criteria, such as the presence of these keys with a value of 'Enabled'.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2023-06-12