
Summary
The analytic rule detects modifications to the Windows registry key "AuthenticationLevelOverride" within the Terminal Server Client settings. Utilizing Sysmon EventID 12 and 13, it identifies changes where the registry value is set to 0x00000000. This change is significant as it can indicate an attempt to lower authentication levels for remote connections, potentially exploited by malware like DarkGate for unauthorized remote access and further system compromise. The rule uses the Endpoint.Registry datamodel to capture and analyze these events, providing a timely response to potential threats that could lead to data exfiltration or unauthorized access.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1112
Created: 2024-11-13