heroui logo

Exports Registry Key To a File

Sigma Rules

View Source
Summary
The rule 'Exports Registry Key To a File' aims to detect the exportation of Windows Registry keys to a file using the Regedit process. This technique is commonly associated with potential exfiltration activities, where threat actors may attempt to gather sensitive configuration or credential information from the registry. The detection works by monitoring process creation logs specifically looking for instances of 'regedit.exe', with command line parameters that typically indicate an export operation. The conditions set in the rule require that the operation must involve specific registry hives, such as 'HKEY_LOCAL_MACHINE', and should not include certain sensitive hives like '\system', '\sam', or '\security' to minimize false positives. Thus, the rule is useful in identifying unauthorized attempts to exfiltrate registry data while accommodating legitimate administrative activities.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
Created: 2020-10-07