heroui logo

Remote Registry Recon

Sigma Rules

View Source
Summary
The 'Remote Registry Recon' rule is designed to detect unauthorized remote procedure calls (RPC) that are targeting registry information on Windows systems. Specifically, this detection mechanism monitors events generated by the RPC Firewall, focusing on EventLog entries associated with registry access attempts. When specific conditions are met — notably a call to the defined UUID for the Remote Registry Protocol (RRP) and specific operation numbers indicating registry communications — an alert is triggered to signal potential reconnaissance activity. The rule aims to identify and block reconnaissance attempts that may lead to lateral movement within a network, as attackers frequently gather registry information to identify potential targets. The defenses rely on proper deployment of the RPC Firewall, and all related RPC processes must have auditing enabled to ensure effective detection. Operators must be aware of legitimate remote administrative activities that may trigger false positives, emphasizing the importance of contextual awareness in event analysis.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Application Log
  • Network Traffic
Created: 2022-01-01