Windows Recall Feature Enabled Via Reg.EXE
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects the enabling of the Windows Recall feature via registry manipulation. Windows Recall can be enabled by deleting the existing "DisableAIDataAnalysis" value, or setting it to 0. Adversaries may enable Windows Recall as part of post-exploitation discovery and collection activities. This rule assumes that Recall is already explicitly disabled on the host, and subsequently enabled by the adversary.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "Process started" AND (PROCESSNAME endswith "\reg.exe" OR ORIGINALFILENAME = "reg.exe") AND (COMMANDLINE contains "Microsoft\Windows\WindowsAI" AND COMMANDLINE contains "DisableAIDataAnalysis") AND (COMMANDLINE contains "add,0" OR COMMANDLINE contains "delete") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Sajid Nawaz Khan


