heroui logo

Potentially Suspicious Command Executed Via Run Dialog Box - Registry

Sigma Rules

View Source
Summary
This detection rule identifies potentially suspicious commands executed via the Windows Run dialog box by monitoring the 'RunMRU' registry key. Threat actors have been known to exploit this feature for malicious purposes, tricking users into executing harmful commands that may appear legitimate, often disguised as necessary actions like CAPTCHA verifications. By analyzing the values associated with the 'RunMRU' registry key, the rule alerts on attempts that match patterns commonly used in PowerShell and WMIC command executions, particularly focusing on keywords that indicate potentially malicious intent. This rule is critical as it targets a common tactic used by adversaries, and its implementation can help in early detection of suspicious activities in Windows environments.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2024-11-01