
Summary
This detection rule is designed to monitor modifications made to the registry settings associated with Internet Explorer and other Windows components that leverage these settings. It specifically looks for changes in registry keys that could indicate an attacker is attempting to manipulate trusted site zones or introduce scripts for persistence mechanisms. Such alterations generally target the following registry paths: \Software\Microsoft\Windows\CurrentVersion\Internet Settings, with a focus on keys related to caching (\Cache), zone mapping (\ZoneMap), and WPAD decisions (\WpadDecision). The rule further filters changes based on specific details to minimize false positives and ensure that only relevant registry operations are flagged.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1112
Created: 2022-01-22