heroui logo

Windows Modify Registry Reg Restore

Splunk Security Content

View Source
Summary
The 'Windows Modify Registry Reg Restore' detection rule aims to identify unauthorized attempts to restore registry backup data on Windows systems using the 'reg.exe' tool with the 'restore' parameter. By concentrating on process execution logs and their command-line arguments, this rule builds upon telemetry from Endpoint Detection and Response (EDR) agents. Given that legitimate administrative actions can overlap with potentially malicious ones, this detection serves as a critical alerting mechanism for post-exploitation behaviors. Specifically, tools like winpeas may employ similar registry manipulation techniques that could be used by attackers to maintain persistence or bypass security policies. While the rule provides insights into potentially malicious activities, it has been deprecated, suggesting that users should seek alternative detection methods or updates in analytics for effective threat detection.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1012
Created: 2025-01-24