
Summary
This detection rule identifies a potential persistence mechanism on Windows systems, leveraging the RUN key in the Windows registry. Specifically, it targets entries in the registry that may point to suspicious folders often associated with malicious activity. The rule examines the 'Run' registry key located at 'HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run'. It looks for values ending with specific paths commonly abused by malware for persistence, such as those leading to system directories and user profile temporary folders. Given the nature of the paths being monitored, this rule helps in the identification of malware attempting to maintain persistence on compromised systems by executing malicious binaries each time the user logs in. The level of alerting is set to high, indicating a strong association with known persistence techniques outlined by attack frameworks such as MITRE ATT&CK (T1547.001). The rule is particularly valuable for threat detection teams monitoring Windows environments for advanced threats that utilize stealthy persistence methods.
Categories
- Endpoint
- Windows
- macOS
- Linux
Data Sources
- Windows Registry
Created: 2018-07-18