heroui logo

RedMimicry Winnti Playbook Registry Manipulation

Sigma Rules

View Source
Summary
The 'RedMimicry Winnti Playbook Registry Manipulation' rule is designed to detect potentially malicious actions associated with the RedMimicry Winnti playbook by monitoring registry events on Windows systems. Specifically, the rule looks for modifications to a registry key located at 'HKLM\SOFTWARE\Microsoft\HTMLHelp\data'. This registry path may be targeted for manipulation by threat actors employing evasion techniques to disguise their activities. Since the Winnti group has been known for its sophisticated tactics, monitoring for changes to this registry key is crucial for identifying potential compromise or lateral movement efforts within an organization. The rule's high severity level indicates that detection of any such changes should prompt further investigation as these could signify attempts to alter legitimate functionality or persist within the environment undetected.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2020-06-24