heroui logo

Potential PendingFileRenameOperations Tampering

Sigma Rules

View Source
Summary
This detection rule identifies potential tampering with the Windows registry key 'PendingFileRenameOperations', which is used to schedule files for renaming or deletion upon the next system reboot. The rule is particularly focused on activity from uncommon or suspicious image locations, which may indicate a malicious actor attempting to execute files post-reboot to enable persistence or evade detection. The rule involves monitoring registry set events, specifically focusing on the 'PendingFileRenameOperations' key, and correlates these events with suspicious behaviors such as the use of known tools like 'reg.exe' or 'regedit.exe' from unexpected directories such as 'C:\Users\Public' or 'C:\AppData\Local\Temp'. If any of these conditions are met, the rule triggers an alert, helping analysts to identify and investigate potentially malicious activities related to file renaming operations within the Windows ecosystem.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2023-01-27