heroui logo

Detected Windows Software Discovery

Sigma Rules

View Source
Summary
The rule 'Detected Windows Software Discovery' aims to identify potential adversarial activity associated with software enumeration on Windows systems. This activity usually signifies an attempt by attackers to gather information about installed software, specifically targeting security applications or known vulnerabilities present in specific software versions. The rule focuses on identifying processes that leverage the 'reg.exe' command to query information from the Windows Registry, particularly looking for the 'svcversion' value under the software subkey. The detection mechanism is straightforward, relying on specific indicators such as the command-line parameters and the command being executed. While legitimate administrative tasks may trigger these alerts, this detection rule helps in monitoring and responding to suspicious enumeration activities within a Windows environment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1518
Created: 2020-10-16