Registry Tampering by Potentially Suspicious Processes
Detects suspicious registry modifications made by suspicious processes such as script engine processes such as WScript, or CScript etc. These processes are rarely used for legitimate registry modifications, and their activity may indicate an attempt to modify the registry without using standard tools like regedit.exe or reg.exe, potentially for evasion and persistence.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Events for Windows Registry modifications including key creation, modification, and deletion.
detection:
selection:
Image|endswith:
# Add more suspicious processes
- '\mshta.exe'
- '\wscript.exe'
- '\cscript.exe'
filter_main_legit_wscript:
Image|endswith: '\wscript.exe'
TargetObject|contains:
- 'SOFTWARE\Microsoft\Windows NT\CurrentVersion\Notifications\Data\'
- '\Services\bam\State\UserSettings\S-1-'
- 'Software\Microsoft\Windows Script\Settings\Telemetry\wscript.exe\'
- 'Software\Microsoft\Windows\CurrentVersion\Internet Settings\'
condition: selection and not 1 of filter_main_*Some legitimate admin or install scripts may use these processes for registry modifications.
Techniques
Sub-techniques
Registry Modification Attempt Via VBScript - PowerShell
Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods embedded within PowerShell scripts or commands. Threat actors commonly embed VBScript code within PowerShell to perform registry modifications, attempting to evade detection that monitors for direct registry access through traditional tools. This technique can be used for persistence, defense evasion, and privilege escalation by modifying registry keys without using regedit.exe, reg.exe, or PowerShell's native registry cmdlets.
Detects similar activity. Both rules may fire on overlapping events.
Registry Modification Attempt Via VBScript
Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods via common LOLBINs. It could be an attempt to modify the registry for persistence without using straightforward methods like regedit.exe, reg.exe, or PowerShell. Threat Actors may use this technique to evade detection by security solutions that monitor for direct registry modifications through traditional tools.
Detects similar activity. Both rules may fire on overlapping events.