heroui logo

Modify Registry Key

Anvilogic Forge

View Source
Summary
This detection rule is designed to monitor and detect modifications made to the Windows Registry, which is a common tactic employed by adversaries to manipulate system configurations, enhance persistence, and sometimes obfuscate their activities. By leveraging Windows event logs, particularly the EventCode 4657 which indicates an existing registry value modified, the rule identifies instances where registry keys have been altered. Key data such as the host, user involved, and specifics of the registry change (including the old and new values) are extracted and organized for analysis. This can help in identifying malicious behavior associated with various threat actors and malware, including their methods of achieving persistence in compromised environments. Furthermore, the rule includes a broad association with multiple advanced persistent threats (APTs), underscoring the relevance of monitoring registry modifications for detecting sophisticated attacks.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1112
Created: 2024-02-09