Analytics Story: Suspicious Windows Registry Activities
Description
Monitor and detect registry changes initiated from remote locations, which can be a sign that an attacker has infiltrated your system.
Why it matters
Attackers are developing increasingly sophisticated techniques for hijacking target servers, while evading detection. One such technique that has become progressively more common is registry modification. The registry is a key component of the Windows operating system. It has a hierarchical database called "registry" that contains settings, options, and values for executables. Once the threat actor gains access to a machine, they can use reg.exe to modify their account to obtain administrator-level privileges, maintain persistence, and move laterally within the environment. The searches in this story are designed to help you detect behaviors associated with manipulation of the Windows registry.
Detections
Data Sources
Name | Platform | Sourcetype | Source |
---|---|---|---|
Sysmon EventID 1 | Windows | xmlwineventlog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
Sysmon EventID 12 | Windows | xmlwineventlog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
Sysmon EventID 13 | Windows | xmlwineventlog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
References
- https://redcanary.com/blog/windows-registry-attacks-threat-detection/
- https://attack.mitre.org/wiki/Technique/T1112
Source: GitHub | Version: 1