Detectionmediumexperimental
Suspicious Shell Open Command Registry Modification
Detects modifications to shell open registry keys that point to suspicious locations typically used by malware for persistence. Generally, modifications to the `*\shell\open\command` registry key can indicate an attempt to change the default action for opening files, and various UAC bypass or persistence techniques involve modifying these keys to execute malicious scripts or binaries.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Swachchhanda Shrawan Poudel (Nextron Systems)Created Sat Jan 249e8894c0-0ae0-11ef-9d85-1f2942bec57cwindows
Log Source
WindowsRegistry Set
ProductWindows← raw: windows
CategoryRegistry Set← raw: registry_set
Detection Logic
Detection Logic1 selector
detection:
selection:
TargetObject|contains: '\shell\open\command\'
Details|contains:
- '\$Recycle.Bin\'
- '\AppData\Local\Temp\'
- '\Contacts\'
- '\Music\'
- '\PerfLogs\'
- '\Photos\'
- '\Pictures\'
- '\Users\Public\'
- '\Videos\'
- '\Windows\Temp\'
- '%AppData%'
- '%LocalAppData%'
- '%Temp%'
- '%tmp%'
condition: selectionFalse Positives
Legitimate software installations or updates that modify the shell open command registry keys to these locations.
References
MITRE ATT&CK
Rule Metadata
Rule ID
9e8894c0-0ae0-11ef-9d85-1f2942bec57c
Status
experimental
Level
medium
Type
Detection
Created
Sat Jan 24
Path
rules/windows/registry/registry_set/registry_set_susp_shell_open_keys_modification_patterns.yml
Raw Tags
attack.defense-evasionattack.privilege-escalationattack.persistenceattack.t1548.002attack.t1546.001