-
Notifications
You must be signed in to change notification settings - Fork 163
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add rule for detecting hiding shutdown actions #935
Add rule for detecting hiding shutdown actions #935
Conversation
Signed-off-by: Still Hsu <[email protected]>
Signed-off-by: Still Hsu <[email protected]>
Let me know if this looks okay. I've opted to use case insensitive regex instead of substrings. If all looks good, I'll open a PR on the test data repo. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
rule logic looks good 👍
i'm not familiar with this technique though i can kinda guess about it based on the key names. are you able to find a reference or two that i could use to learn more (and we can include in the meta block)?
I agree on the reference, this appears to be one: https://securelist.com/mallox-ransomware/113529/ |
Signed-off-by: Still Hsu <[email protected]>
thank you! |
Summary
This PR adds a rule that detects registry values related to hiding shutdown actions (i.e., logout, shutdown, reboot, etc.), specifically ones using policy registry values. This is often abused by ransomware to prevent mid-encryption-shutdowns.