
Summary
This detection rule monitors the modification of a specific registry entry related to OneDrive, specifically targeting the URL set for the OneDriveStandaloneUpdater.exe. It aims to detect instances where a custom URL is provided for this updater, enabling potential malicious downloads without the execution of typical suspicious files. The specific registry key being monitored is for a setting that controls the update ring configuration for OneDrive. If an anomalous URL is detected, especially during common exploitation techniques associated with command and control behaviors, an alert will be triggered. The downloaded files will typically be stored in a designated path under the user's AppData folder, indicating it is being utilized for potential unwanted software or configurations. Given that the rule is set to a high severity level, it is critical for organizations to maintain vigilance against such behaviors, as they can indicate greater risks of compromise through unauthorized software updates or malicious intent.
Categories
- Windows
- Endpoint
- Identity Management
Data Sources
- Windows Registry
Created: 2022-05-28