Shell Open Registry Keys Manipulation
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects the shell open key manipulation (exefile and ms-settings) used for persistence and the pattern of UAC Bypass using fodhelper.exe, computerdefaults.exe, slui.exe via registry keys (e.g. UACMe 33 or 62)
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "Registry Event" AND (ACCESSES = "SetValue" AND (OBJECTNAME endswith "Classes\ms-settings\shell\open\command\SymbolicLinkValue" OR (OBJECTNAME endswith "Classes\ms-settings\shell\open\command" AND OBJECTVALUENAME = "SymbolicLinkValue")) AND INFORMATION contains "\Software\Classes\{") OR (OBJECTNAME endswith "Classes\ms-settings\shell\open\command\DelegateExecute" OR (OBJECTNAME endswith "Classes\ms-settings\shell\open\command" AND OBJECTVALUENAME = "DelegateExecute")) OR ((ACCESSES = "SetValue" AND (OBJECTNAME endswith "Classes\ms-settings\shell\open\command\(Default),Classes\exefile\shell\open\command\(Default)" OR (OBJECTNAME endswith "Classes\ms-settings\shell\open\command,Classes\exefile\shell\open\command" AND OBJECTVALUENAME = "(Default),(Default)"))) AND INFORMATION != "(Empty)") select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.OBJECTNAME,Action1.OBJECTVALUENAME,Action1.ACCESSES,Action1.USERNAME,Action1.DOMAIN,Action1.PREVVAL,Action1.CHANGES,Action1.INFORMATION
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Christian Burkard (Nextron Systems)


