heroui logo

Windows Query Registry Reg Save

Splunk Security Content

View Source
Summary
The 'Windows Query Registry Reg Save' analytic was designed to detect potentially malicious use of the reg.exe command with the 'save' parameter. This command is often employed by threat actors to dump sensitive information, including credentials, from the Windows registry. By focusing on logs from Endpoint Detection and Response (EDR) systems like Sysmon and Windows Event Logs, the analytic captures relevant process execution details and command-line arguments that signify misuse of the registry. The detection aims to highlight potentially malicious behavior which could lead to privilege escalation or unauthorized data access. However, this rule is now marked as deprecated, meaning it is no longer actively maintained or recommended for use. Instead, alternative detection mechanisms might be available through updated analytics or EDR capabilities.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1012
Created: 2025-01-24