
Summary
This detection rule identifies the execution of Sysinternals tools on Windows systems by monitoring the creation of the 'EulaAccepted' registry key, which is commonly altered or created when a Sysinternals tool is first run. The rule is designed to flag potential Unwanted Applications (PUAs) that may not be malicious but could be used for resource development by attackers. Its effectiveness relies on tracking changes in the Windows Registry, specifically for entries that signify accepted user agreements for specific tools. The rule aims to provide visibility into potential misuse of Sysinternals tools, which are legitimate utilities but can also be exploited for nefarious purposes. Users are advised to be cautious as legitimate operations may trigger false positives.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
Created: 2017-08-28