heroui logo

Windows RunMRU Command Execution

Splunk Security Content

View Source
Summary
The rule "Windows RunMRU Command Execution" is designed to detect alterations to the Windows RunMRU registry key, which logs commands initiated through the Run dialog box (Windows+R). This analytic approach utilizes telemetry from Endpoint Detection and Response (EDR) solutions, specifically targeting Sysmon Event IDs 11 and 13 to monitor registry events. Given that adversaries frequently leverage the Run dialog for executing potentially malicious commands while disguising their activities, timely detection of such modifications is crucial for defense evasion assessments. This rule discards changes to the MRUList value to ensure that only genuine command changes are flagged, thereby reducing irrelevant alerts, which allows security teams to focus on suspicious activities potentially indicating the presence of malware or unauthorized user actions.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1202
Created: 2025-01-21