heroui logo

Imports Registry Key From a File

Sigma Rules

View Source
Summary
This detection rule monitors the execution of the Windows Registry Editor (regedit.exe) specifically targeting scenarios where it imports a file into the Windows Registry. The rule defines a selection criteria based on process creation events, focusing on the regedit.exe image and specific command line arguments that signify an import operation (e.g., using '/i', '/s', or involving '.reg' files). Additionally, to reduce false positives, the rule includes multiple filter conditions that are used to exclude benign uses of regedit.exe, such as certain command line options that do not relate to registry imports. The conditions for triggering an alert require that all selection criteria are met while ensuring that none of the filters are satisfied. False positives may arise from legitimate usage scenarios, such as the import of keys by legitimate applications like Evernote.
Categories
  • Windows
Data Sources
  • Process
Created: 2020-10-07