
Summary
This detection rule monitors and detects the export of critical Windows Registry keys to a file using the Regedit executable. The rule is designed to identify potential exfiltration attempts where an unauthorized user attempts to gain access to sensitive Registry information. The detection conditions include filtering for processes related to Regedit with a specific command line structure that indicates the export function. It requires a combination of conditions related to the process image and command line parameters, focusing on exports that involve critical keys such as those found in the HKEY_LOCAL_MACHINE hive. This rule is relevant in environments where protection against data exfiltration through Registry key exports is critical.
Categories
- Windows
- Endpoint
- Infrastructure
Data Sources
- Process
- Windows Registry
Created: 2020-10-12