
Summary
This rule monitors for potentially malicious modifications made to the Windows registry by processes that are typically used for scripting, such as WScript and CScript. These processes are not commonly associated with legitimate registry editing activities. The detection is built upon identifying when these specific scripting engines are utilized to alter registry values, which could indicate evasive tactics aimed at establishing persistence mechanisms on a compromised system. Given that legitimate administration scripts may also invoke these processes, there is a medium level of sensitivity for false positives. The rule references notable persistence strategies from the MITRE ATT&CK framework, particularly regarding defense evasion strategies that exploit common scripting engines to evade detection by standard tools like regedit.exe or reg.exe.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2025-08-13