heroui logo

Potential Persistence Attempt Via Run Keys Using Reg.EXE

Sigma Rules

View Source
Summary
This detection rule identifies potential persistence attempts on Windows systems by monitoring command line activities related to the 'reg.exe' tool. Specifically, it targets the addition of entries to the 'Run' registry key, which is commonly exploited by malware to maintain persistence. The rule utilizes a command line filter that looks for the execution of 'reg.exe' with arguments indicating the addition of keys under 'Software\Microsoft\Windows\CurrentVersion\Run'. By tracking these events, the security monitoring system can alert administrators to potentially malicious configurations which may allow unauthorized software to execute at system startup. Due to the risk of false positives, organizations should consider the context of the events and exercise caution when responding to alerts, as legitimate applications and administrators may also make use of this functionality during installation or configuration processes.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
Created: 2021-06-28