Detectionlowexperimental

System Information Discovery via Registry Queries

Detects attempts to query system information directly from the Windows Registry.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
lazargCreated Thu Jun 12Updated Sat Oct 250022869c-49f7-4ff2-ba03-85ac42ddac58windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic3 selectors
detection:
    selection_cmd_reg:
        Image|endswith: '\reg.exe'
        CommandLine|contains: 'query'
        CommandLine|contains|windash: '-v'
    selection_cmd_powershell:
        Image|endswith:
            - '\powershell.exe'
            - '\pwsh.exe'
        CommandLine|contains:
            - 'Get-ItemPropertyValue'
            - 'gpv'
    selection_keys:
        CommandLine|contains:
            - '\SOFTWARE\Microsoft\Windows Defender' # Details about defender state
            - '\SOFTWARE\Microsoft\Windows NT\CurrentVersion' # Provides details about the OS
            - '\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall' # Lists installed programs
            - '\SYSTEM\CurrentControlSet\Control\TimeZoneInformation' # Contains time zone details
            - '\SYSTEM\CurrentControlSet\Services' # Details about existing services
    condition: 1 of selection_cmd_* and selection_keys
False Positives
Unlikely

False positives are unlikely for most environments. High confidence detection.

Testing & Validation

Simulations

atomic-red-teamT1010
View on ART

System Information Discovery

GUID: 66703791-c902-4560-8770-42b8a91f7667

atomic-red-teamT1082
View on ART

Discover OS Product Name via Registry

GUID: be3b5fe3-a575-4fb8-83f6-ad4a68dd5ce7

atomic-red-teamT1082
View on ART

Discover OS Build Number via Registry

GUID: acfcd709-0013-4f1e-b9ee-bc1e7bafaaec

Regression Tests

by SigmaHQ Team
Positive Detection Test1 matchevtx

Microsoft-Windows-Sysmon

Rule Metadata
Rule ID
0022869c-49f7-4ff2-ba03-85ac42ddac58
Status
experimental
Level
low
Type
Detection
Created
Thu Jun 12
Modified
Sat Oct 25
Author
Path
rules/windows/process_creation/proc_creation_win_discovery_via_reg_queries.yml
Raw Tags
attack.discoveryattack.t1082
View on GitHub