Detectionmediumtest
Potential Configuration And Service Reconnaissance Via Reg.EXE
Detects the usage of "reg.exe" in order to query reconnaissance information from the registry. Adversaries may interact with the Windows registry to gather information about credentials, the system, configuration, and installed software.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Timur Zinniatullin, oscd.communityCreated Mon Oct 21Updated Sun Feb 05970007b7-ce32-49d0-a4a4-fbef016950bdwindows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation
Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.
Detection Logic
Detection Logic3 selectors
detection:
selection_img:
- Image|endswith: '\reg.exe'
- OriginalFileName: 'reg.exe'
selection_flag:
CommandLine|contains: 'query'
selection_key:
CommandLine|contains:
- 'currentVersion\windows'
- 'winlogon\'
- 'currentVersion\shellServiceObjectDelayLoad'
- 'currentVersion\run' # Also covers the strings "RunOnce", "RunOnceEx" and "runServicesOnce"
- 'currentVersion\policies\explorer\run'
- 'currentcontrolset\services'
condition: all of selection_*False Positives
Discord
References
MITRE ATT&CK
Rule Metadata
Rule ID
970007b7-ce32-49d0-a4a4-fbef016950bd
Status
test
Level
medium
Type
Detection
Created
Mon Oct 21
Modified
Sun Feb 05
Author
Path
rules/windows/process_creation/proc_creation_win_reg_query_registry.yml
Raw Tags
attack.discoveryattack.t1012attack.t1007