heroui logo

Service Registry Key Deleted Via Reg.EXE

Sigma Rules

View Source
Summary
This detection rule is designed to identify the use of the Windows `reg.exe` utility for deleting service registry keys. Attackers may utilize this technique to remove or disable security services such as antivirus programs, making it easier for them to carry out malicious activities without detection. The rule specifically monitors for the execution of `reg.exe` commands that have the `delete` flag included in their command line arguments and are targeting the service-related registry path, `\SYSTEM\CurrentControlSet\services\`. The rule operates at a high severity level due to the potential risk it poses to system integrity and the security posture of the affected machine. It effectively distinguishes legitimate administrative actions from potentially malicious attempts to compromise system security.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-08-01