heroui logo

Suspicious Reg Add Open Command

Sigma Rules

View Source
Summary
The "Suspicious Reg Add Open Command" detection rule is designed to identify potentially malicious activity involving Windows registry manipulation by monitoring command-line arguments related to registry operations. This rule specifically looks for instances where a threat actor may be using the 'reg add' command to modify the registry in a suspicious manner, particularly targeting the 'ms-settings' path under 'HKCU\Software\Classes'. It detects command-line invocations that include adding a new string value ('/ve') or a string value named 'DelegateExecute' within the context of 'ms-settings'. Additionally, the rule captures any 'reg delete' command targeting the same path, indicating attempts to clear or obscure prior modifications. The conditions to trigger this detection require only one of the specified selections to match, making it comprehensive in identifying various forms of suspicious access or changes to the relevant registry hives. This behavior is commonly associated with credential dumping attacks, where attackers often manipulate registry keys to gain elevated privileges or access sensitive information stored in the SAM, SECURITY, and SYSTEM hives. Monitoring for these registry changes is critical in identifying and responding to potential breaches or malware behavior in a Windows environment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
Created: 2021-12-20