
Summary
This analytic targets the monitoring of Image File Execution Options (IFEO) registry keys in Windows Systems, specifically through Windows Event Logs, focusing on EventCode 3000 from the Application channel. The detection identifies modifications or creations of the IFEO keys, which can indicate suspicious activity typically associated with persistence or evasion tactics used by attackers. By tracking the process names related to these changes, security teams can detect potential attempts at process monitoring or code execution manipulation. Attackers may leverage these techniques to maintain control over a compromised system, making this detection crucial for identifying early signs of a security breach.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1546.012
Created: 2024-11-13