Intel: Rule_Monitoring Suspicious Execution of Autorun Registry Keys

Executive Summary

This investigation was initiated following the detection of suspicious modifications to AutoRun registry keys, indicative of potential unauthorized software execution or persistence mechanisms. Analysis confirmed the activity stemmed from a user-initiated download outside the organization’s approved software deployment channels. The user reported issues with the version of Notepad++ available via Software Center and Coupa, prompting them to download an alternative version from the internet. While the behavior was not malicious, it constitutes a policy violation. The downloaded software was identified as grayware (PUP), and a removal request was submitted. The user was educated on proper software installation procedures. Closing this alert as Resolved | Bad BAU. (Location: Corp – South Africa)

Alert Details

This detection rule identifies suspicious modifications to AutoRun registry keys via Microsoft Defender for Endpoint (MDE), often leveraged by threat actors or unauthorized tools for persistence.

This alert was triggered on host JD-MKT-001 for user CORP\jdoe, following the detection of a registry key modification associated with the installation of Notepad++ software.

Raw command line string observed:
n/a in this case

Initial Enrichment
Endpoint & Network Analysis (Splunk + MDE Insights)
IOC & Threat Intelligence
Documentation & Business Justification
Conclusion
Critical Artifacts Checklist (DO NOT FORGET TO COLLECT)