Shell Open Registry Keys Manipulation

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the shell open key manipulation (exefile and ms-settings) used for persistence and the pattern of UAC Bypass using fodhelper.exe, computerdefaults.exe, slui.exe via registry keys (e.g. UACMe 33 or 62)

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Registry Event" AND (ACCESSES = "SetValue" AND (OBJECTNAME endswith "Classes\ms-settings\shell\open\command\SymbolicLinkValue" OR (OBJECTNAME endswith "Classes\ms-settings\shell\open\command" AND OBJECTVALUENAME = "SymbolicLinkValue")) AND INFORMATION contains "\Software\Classes\{") OR (OBJECTNAME endswith "Classes\ms-settings\shell\open\command\DelegateExecute" OR (OBJECTNAME endswith "Classes\ms-settings\shell\open\command" AND OBJECTVALUENAME = "DelegateExecute")) OR ((ACCESSES = "SetValue" AND (OBJECTNAME endswith "Classes\ms-settings\shell\open\command\(Default),Classes\exefile\shell\open\command\(Default)" OR (OBJECTNAME endswith "Classes\ms-settings\shell\open\command,Classes\exefile\shell\open\command" AND OBJECTVALUENAME = "(Default),(Default)"))) AND INFORMATION != "(Empty)") select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.OBJECTNAME,Action1.OBJECTVALUENAME,Action1.ACCESSES,Action1.USERNAME,Action1.DOMAIN,Action1.PREVVAL,Action1.CHANGES,Action1.INFORMATION

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Christian Burkard (Nextron Systems)