heroui logo

Service Registry Key Read Access Request

Sigma Rules

View Source
Summary
This detection rule monitors read access requests on the Windows services registry key, specifically looking for Event ID 4663, which indicates attempted access to a registry object. The rule's focus on the '\SYSTEM\' and 'ControlSet\Services\' paths is critical, as adversaries may exploit weaknesses in the permissions of these registry keys to redirect legitimate service calls to their own malicious executables. The intended detection aims to identify potential privilege escalation or persistence techniques where malware may hijack service configurations. It’s essential for organizations to enable System Access Control Lists (SACLs) on relevant registry keys to properly track and record any unauthorized access attempts, which could indicate malicious activity.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Windows Registry
  • Logon Session
ATT&CK Techniques
  • T1574.011
Created: 2023-09-28