heroui logo

Threat Intel Windows Registry Indicator Match

Elastic Detection Rules

View Source
Summary
This detection rule monitors Windows registry activity to identify potential threats based on threat intelligence indicators. It triggers an alert when there is a match between local registry events and known bad indicators from threat intelligence data, specifically those that are ingested within the last 30 days. The rule utilizes multiple data sources including various Elastic Beats indices to correlate registry data with threat intelligence indicators. It leverages the query language Kuery for effective searches and analysis. A critical aspect of this rule is the ability to validate the legitimacy of the threat indicators post-match and review any associated activity for further investigation. The rule suggests several investigation measures including analyzing process behaviors, user accounts involved, and associated DNS cache entries. Additionally, it includes steps for mitigating false positives, incident response recommendations, and details about required setup for the rule to be effective. Overall, this rule is a comprehensive approach to monitoring and responding to threats via Windows registry changes, ensuring that security teams have the necessary insights and actions to take when suspicious activity is detected.
Categories
  • Windows
  • Endpoint
  • Cloud
Data Sources
  • Windows Registry
  • Network Traffic
  • Application Log
Created: 2023-05-22