heroui logo

Changing Existing Service ImagePath Value Via Reg.EXE

Sigma Rules

View Source
Summary
This detection rule identifies potential unauthorized modifications to Windows service configurations via the Registry by monitoring command line invocations of the 'reg.exe' tool. Adversaries often exploit weaknesses in Windows Registry permissions to replace the legitimate executable paths for services with their malicious payloads. This specific tactic can enable them to execute code at service startup, allowing persistent and covert access to systems. The rule looks for command lines that include the addition of ImagePath entries under the 'HKLM\SYSTEM\CurrentControlSet\Services' path, indicating an attempt to change the executable that will run when the service starts. The focus on the use of 'reg.exe' and specific keywords in command line inputs allows for precise detection of this potentially malicious activity.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1574.011
Created: 2021-12-30