heroui logo

Registry Modification Via Regini.EXE

Sigma Rules

View Source
Summary
This detection rule identifies the execution of the `regini.exe` utility, which is capable of modifying Windows Registry keys. Specifically, it focuses on cases where the utility is invoked with command line arguments indicating the use of external text files to import changes into the Registry. The rule utilizes process creation logs to monitor for instances where `regini.exe` is executed. The detection logic filters out command lines that do not appear to involve the straightforward execution of `regini.exe`, particularly those that include paths that do not conform to expected structures (e.g., the presence of colons followed by non-backslash characters). The rule is categorized as a low severity alert and is designed with false positives in mind, acknowledging that legitimate applications may invoke this utility for routine configurations. As such, proper response strategies should consider the context of the execution before triggering alerts. This rule supports the monitoring of potential misuse of administrative utilities that could lead to unwarranted modifications in the Windows Registry, which is a common target in defense evasion techniques.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2020-10-08