Atbroker Registry Change
Detects creation/modification of Assistive Technology applications and persistence with usage of 'at'
Sigma rule (View on GitHub)
1title: Atbroker Registry Change
2id: 9577edbb-851f-4243-8c91-1d5b50c1a39b
3status: test
4description: Detects creation/modification of Assistive Technology applications and persistence with usage of 'at'
5references:
6 - http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/
7 - https://lolbas-project.github.io/lolbas/Binaries/Atbroker/
8author: Mateusz Wydra, oscd.community
9date: 2020-10-13
10modified: 2023-01-19
11tags:
12 - attack.privilege-escalation
13 - attack.defense-evasion
14 - attack.t1218
15 - attack.persistence
16 - attack.t1547
17logsource:
18 category: registry_event
19 product: windows
20detection:
21 selection:
22 TargetObject|contains:
23 - 'Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATs'
24 - 'Software\Microsoft\Windows NT\CurrentVersion\Accessibility\Configuration'
25 filter_atbroker:
26 Image: 'C:\Windows\system32\atbroker.exe'
27 TargetObject|contains: '\Microsoft\Windows NT\CurrentVersion\Accessibility\Configuration'
28 Details: '(Empty)'
29 filter_uninstallers:
30 Image|startswith: 'C:\Windows\Installer\MSI'
31 TargetObject|contains: 'Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATs'
32 condition: selection and not 1 of filter_*
33falsepositives:
34 - Creation of non-default, legitimate at usage
35level: medium
References
Related rules
- Scheduled Task Creation with Curl and PowerShell Execution Combo
- Startup/Logon Script Added to Group Policy Object
- APT27 - Emissary Panda Activity
- AWS IAM S3Browser LoginProfile Creation
- AWS IAM S3Browser Templated S3 Bucket Policy Creation