
Summary
This detection rule identifies attempts to modify the Windows registry using VBScript embedded within PowerShell scripts or commands. The technique exploits the CreateObject method with Wscript.shell to perform registry changes through the RegWrite method, allowing threat actors to bypass typical monitoring that focuses on native registry access tools like regedit.exe and PowerShell cmdlets. Such behavior can arise in scenarios where attackers are aiming for persistence, evading security measures, or escalating privileges by secretly altering registry keys. The rule effectively captures these potentially malicious actions by monitoring for specific keywords within the script blocks indicative of this technique. However, it also notes the potential for false positives, as legitimate administrative scripts may perform similar actions for valid purposes.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Script
Created: 2025-08-13