heroui logo

Potential Persistence Via TypedPaths

Sigma Rules

View Source
Summary
This detection rule aims to identify malicious persistence mechanisms through monitoring the Windows registry, specifically by targeting the 'TypedPaths' key under 'HKEY_CURRENT_USER' or 'HKEY_LOCAL_MACHINE'. Modification of this key by a non-standard application (not via the typical Windows Explorer process) may suggest an unauthorized persistence attempt by an attacker. The rule works by detecting changes to registry values within the specified path, ensuring that the modification originates from an application other than the standard Windows explorer.exe processes. The potential for persistence exists as attackers often use such registry entries to maintain access to a compromised system across reboots. This technique aligns with common post-exploitation tactics used to embed malicious behavior within user registry configurations.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2022-08-22