
Summary
This detection rule identifies potentially suspicious activity related to the importation of registry files via the 'reg.exe' utility in Windows. The rule triggers when a '.reg' file is imported from paths commonly associated with temporary or user-specific directories, which are often leveraged by attackers to disguise malicious activities. The detection logic employs a combination of conditions, checking the command line for the presence of 'import', the name of the executable, and the file paths from which the registry files are being imported. Notably, such activities are typical in attack scenarios aiming for defense evasion (MITRE ATT&CK technique T1112). False positives include legitimate activities such as administrative tasks that involve the import of registry keys. The rule is designed to monitor process creation events under Windows environments, particularly in the context of potential malware behavior or unauthorized changes to the system registry.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
Created: 2022-08-01