Skip to content

Latest commit

 

History

History
23 lines (17 loc) · 780 Bytes

mde_persistence_registry_winlogon_t1547.md

File metadata and controls

23 lines (17 loc) · 780 Bytes

Title

Winlogon Registry Key Persistence

Tactics:

  • Persistence
  • T1547: Boot or Logon Autostart Execution
  • T1547.001: Registry Run Keys / Startup Folder

Source

Description

Find Winlogon with outbound connections #MDE

Kusto:

DeviceRegistryEvents  
| where ActionType in~ ("RegistryValueSet","RegistryValueCreated")  
| where ( RegistryKey has @"SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" or RegistryKey has @"SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" ) and RegistryValueName in~ ("shell","userinit")
// review the key and associated key value to understand if malicious activity has taken place e.g. C:\Windows\system32\userinit.exe, C:\Windows\System32\evil.exe