Files
hayabusa/rules/Sigma/win_regedit_import_keys.yml
T
2021-11-14 11:00:56 +09:00

44 lines
1.3 KiB
YAML

title: Imports Registry Key From a File
author: Oddvar Moe, Sander Wiebing, oscd.community
date: 2020/10/07
description: Detects the import of the specified file to the registry with regedit.exe.
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
Image: '*\regedit.exe'
SELECTION_3:
CommandLine: '* /i *'
SELECTION_4:
CommandLine: '*.reg*'
SELECTION_5:
CommandLine: '* /e *'
SELECTION_6:
CommandLine: '* /a *'
SELECTION_7:
CommandLine: '* /c *'
SELECTION_8:
CommandLine|re: :[^ \\\\]
condition: (SELECTION_1 and ((SELECTION_2 and (SELECTION_3 or SELECTION_4)) and not
((SELECTION_5 or SELECTION_6 or SELECTION_7))) and not (SELECTION_8))
falsepositives:
- Legitimate import of keys
fields:
- ParentImage
- CommandLine
id: 73bba97f-a82d-42ce-b315-9182e76c57b1
level: medium
logsource:
category: process_creation
product: windows
references:
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSBinaries/Regedit.yml
- https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
status: experimental
tags:
- attack.t1112
- attack.defense_evasion
yml_filename: win_regedit_import_keys.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation