
Summary
The Winlogon Notify Key Logon Persistence rule is designed to detect potential abuse of the Windows Winlogon service by adversaries attempting to establish persistence via the registry. Winlogon.exe, a crucial Windows component, manages user logon and logoff actions alongside secure attention sequences. Attackers may exploit the Winlogon Notify registry key to automatically load malicious DLLs during the user login process, thereby ensuring their code runs with legitimate user sessions. The detection mechanism targets the registry path that describes the Notify key, particularly monitoring for additions or modifications of DLL files in the specified registry location. A high alert level indicates the critical nature of this persistence technique, which can be indicative of unauthorized remote access or malware behavior.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1547.004
Created: 2021-12-30