Detectionhightest

Suspicious Run Key from Download

Detects the suspicious RUN keys created by software located in Download or temporary Outlook/Internet Explorer directories

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Florian Roth (Nextron Systems), Swachchhanda Shrawan Poude (Nextron Systems)Created Tue Oct 01Updated Mon Feb 179c5037d1-c568-49b3-88c7-9846a5bdc2bewindows
Log Source
WindowsRegistry Event
ProductWindows← raw: windows
CategoryRegistry Event← raw: registry_event

Events for Windows Registry modifications including key creation, modification, and deletion.

Detection Logic
Detection Logic1 selector
detection:
    selection:
        Image|contains:
            - '\AppData\Local\Packages\Microsoft.Outlook_'
            - '\AppData\Local\Microsoft\Olk\Attachments\'
            - '\Downloads\'
            - '\Temporary Internet Files\Content.Outlook\'
            - '\Local Settings\Temporary Internet Files\'
        TargetObject|contains:
            - '\Software\Microsoft\Windows\CurrentVersion\Run'
            - '\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run'
            - '\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run'
    condition: selection
False Positives

Software installers downloaded and used by users

Rule Metadata
Rule ID
9c5037d1-c568-49b3-88c7-9846a5bdc2be
Status
test
Level
high
Type
Detection
Created
Tue Oct 01
Modified
Mon Feb 17
Path
rules/windows/registry/registry_event/registry_event_susp_download_run_key.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.t1547.001
View on GitHub