title: Sticky Key Like Backdoor Usage description: Detects the usage and installation of a backdoor that uses an option to register a malicious debugger for built-in tools that are accessible in the login screen references: - https://blogs.technet.microsoft.com/jonathantrull/2016/10/03/detecting-sticky-key-backdoors/ author: Florian Roth, @twjackomo date: 2018/03/15 logsource: product: windows service: sysmon detection: selection_process: EventID: 1 ParentImage: - '*\winlogon.exe' CommandLine: - '*\cmd.exe sethc.exe *' - '*\cmd.exe utilman.exe *' - '*\cmd.exe osk.exe *' - '*\cmd.exe Magnify.exe *' - '*\cmd.exe Narrator.exe *' - '*\cmd.exe DisplaySwitch.exe *' selection_registry: EventID: 13 TargetObject: - '*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger' - '*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utilman.exe\Debugger' - '*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\osk.exe\Debugger' - '*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Magnify.exe\Debugger' - '*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Narrator.exe\Debugger' - '*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DisplaySwitch.exe\Debugger' EventType: 'SetValue' condition: 1 of them falsepositives: - Unlikely level: critical