heroui logo

Windows SnappyBee Create Test Registry

Splunk Security Content

View Source
Summary
The detection rule 'Windows SnappyBee Create Test Registry' is focused on monitoring the Windows registry modifications specifically under the path `SOFTWARE\Microsoft\Test`. This registry location is infrequently used by standard applications in production environments, making any changes here particularly suspicious. The analytics utilize Sysmon Event ID 13 (Registry Value Set) to identify unauthorized changes and log activities related to these modifications. The detection emphasizes the need for analysts to investigate any processes tied to these registry alterations, especially those associated with unsigned executables or indicative command-line behavior that may suggest the presence of malware or unauthorized software. The rule is designed to capture potentially malicious activity that targets this seldom-used registry location.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1112
Created: 2025-02-11