Hypothesis 1: Persistence An adversary is maintaining a persistent foothold by modifying Windows Registry Run keys on non-standard host systems (e.g., development servers). | Tools: * Endpoint Detection and Response (EDR): Used to query all systems for specific registry key modifications (HKCU\Software\Microsoft\Windows\CurrentVersion\Run). * OSQuery/Velociraptor: Used for rapid, ad-hoc, deep-dive querying of endpoint file systems and registry keys across the environment. Technique: Stack Counting & Baselining—Search for all entries written to the Run key in the last 90 days, focusing on entries that execute files from unusual directories (e.g., user profiles, temporary folders) or processes without valid digital signatures. | Containment & Eradication: 1. Isolate the affected host(s) immediately from the network (network containment). 2. Delete the malicious registry key entry and the associated file/payload. 3. Full Forensic Image/Memory Dump of the host to determine initial access and lateral movement. 4. Update Detection: Create a high-fidelity detection rule (e.g., Sigma rule) to alert on any future modifications to this specific registry path by any non-whitelisted process. |