heroui logo

Image File Execution Options Injection

Elastic Detection Rules

View Source
Summary
The detection rule identifies potentially malicious activity related to the modification of Windows Registry keys associated with Image File Execution Options (IFEO) and SilentProcessExit. Adversaries can exploit IFEO by inserting debugger values to redirect executable launches, allowing them to execute payloads of their choice and maintain persistence. This rule actively monitors for changes in specific registry paths, indicating the inclusion of suspicious executables. It utilizes Elastic Query Language (EQL) to analyze the registry for unauthorized modifications pertaining to Debugger and MonitorProcess values in particular Windows Registry directories. The functionality of these keys is legitimate for software debugging, but malicious actors can abuse it to execute code stealthily. The rule is set to trigger when modifications occur in the specified registry locations, accommodating a range of Windows environments. By flagging these configurations, the detection aims to mitigate risks associated with undetected persistence mechanisms utilized by attackers.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Application Log
  • Process
ATT&CK Techniques
  • T1546
  • T1546.012
  • T1112
Created: 2020-11-17