
Summary
This detection rule triggers on the execution of the Windows `reg.exe` utility with the delete command targeted at Safe Boot registry keys. Attackers may use this technique to manipulate system configurations, specifically to disable Safe Boot functionality that can be leveraged by security software during system recovery. By detecting commands that attempt to delete entries within the `\SYSTEM\CurrentControlSet\Control\SafeBoot` registry path, the rule aims to capture potentially malicious activities that typically signify an intention to evade security measures. The detection operates by analyzing process creation events logged in the system, focusing particularly on the instantiation of `reg.exe` with specified command line arguments. This rule is considered a high-level security alert and is relevant for threat detection teams monitoring for defenses against malware that seeks to compromise system integrity.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Windows Registry
Created: 2022-08-08