
Summary
This detection rule focuses on monitoring the usage of Windows Registry and PowerShell commands by non-privileged users to make unauthorized modifications to service configurations. The primary intent is to identify potentially malicious behavior that may indicate an attempt to escalate privileges or exploit system vulnerabilities. The rule specifically looks for command-line invocations containing the 'reg' command, or PowerShell cmdlets like 'set-itemproperty' and 'new-itemproperty'. These commands are typically used to alter service configurations in the Windows Registry under 'ControlSet' and 'Services'. The rule is designed to trigger alerts when processes executed by users with medium integrity levels attempt to modify sensitive registry keys related to service execution paths and configuration settings, thereby potentially facilitating malicious activities around service management.
Categories
- Windows
Data Sources
- Process
Created: 2020-10-05