heroui logo

Registry Persistence Mechanisms in Recycle Bin

Sigma Rules

View Source
Summary
This rule is designed to detect persistence mechanisms that utilize the Recycle Bin within the Windows operating system by monitoring specific registry key events. The primary target is the registry path associated with the CLSID for the Recycle Bin. The rule identifies registry actions indicating an attempt to create or modify commands that would allow an attacker to maintain persistence on the compromised system. Specifically, it looks for 'RenameKey' events to track changes to the registry key names and 'SetValue' events to detect changes in their values. This approach allows security teams to spot suspicious modifications that may indicate malicious activity aimed at hiding or maintaining presence through legitimate Windows functionality, in this case, the Recycle Bin. The identified key typically concerns the command that gets executed when the Recycle Bin is accessed, thereby serving as a potential launch point for persistent malware execution. The usage of these registry keys makes it harder for standard detection mechanisms to identify malicious behavior since the changes appear to be legitimate actions on the part of the operating system.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2021-11-18