heroui logo

Suspicious Shell Open Command Registry Modification

Sigma Rules

View Source
Summary
This rule detects potentially malicious modifications to the Windows Registry, specifically targeting the `*\shell\open\command` keys. Such modifications are of concern as they may indicate attempts to manipulate file and command execution behaviors, often employed by malware for persistence or privilege escalation through various techniques such as UAC bypass. The rule looks for changes that direct to suspicious locations typically associated with malicious activity, including common temporary directories and user folders that malware may exploit. If the registry paths contain references to well-known directories where malicious scripts or binaries might reside, the rule triggers an alert. It's important to monitor these modifications, especially in a security-conscious environment, to preemptively identify potential threats.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2026-01-24