heroui logo

Windows Registry Payload Injection

Splunk Security Content

View Source
Summary
The Windows Registry Payload Injection analytic is designed to identify suspicious activities involving unusually long data entries written to the Windows registry. This behavior is frequently associated with fileless malware tactics aimed at creating persistence mechanisms without leaving traditional file signatures. The implementation employs telemetry from Endpoint Detection and Response (EDR) solutions, specifically monitoring registry events where the data length surpasses 512 characters. Given that malicious actors often target the registry to manipulate system configurations or maintain access, detecting such anomalies is critical for effective security operations. The analytic combines Sysmon EventIDs related to process and registry changes, allowing for thorough monitoring of security events. By capturing these events within a specific time frame, security teams can focus on potential signs of compromise, enabling timely responses to detected threats.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Script
ATT&CK Techniques
  • T1027
  • T1027.011
Created: 2024-11-13