Rule Library

Sigma Rules

271 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumexperimental

Registry Modification Attempt Via VBScript - PowerShell

Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods embedded within PowerShell scripts or commands. Threat actors commonly embed VBScript code within PowerShell to perform registry modifications, attempting to evade detection that monitors for direct registry access through traditional tools. This technique can be used for persistence, defense evasion, and privilege escalation by modifying registry keys without using regedit.exe, reg.exe, or PowerShell's native registry cmdlets.

WindowsPowerShell Script
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Aug 13windows
Detectionhighexperimental

Suspicious Process Access to LSASS with Dbgcore/Dbghelp DLLs

Detects suspicious process access to LSASS.exe from processes located in uncommon locations with dbgcore.dll or dbghelp.dll in the call trace. These DLLs contain functions like MiniDumpWriteDump that can be abused for credential dumping purposes. While modern tools like Mimikatz have moved to using ntdll.dll, dbgcore.dll and dbghelp.dll are still used by basic credential dumping utilities and legacy tools for LSASS memory access and process suspension techniques.

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Detectionhighexperimental

Suspicious Process Access of MsMpEng by WerFaultSecure - EDR-Freeze

Detects process access events where WerFaultSecure accesses MsMpEng.exe with dbgcore.dll or dbghelp.dll in the call trace, indicating potential EDR freeze techniques. This technique leverages WerFaultSecure.exe running as a Protected Process Light (PPL) with WinTCB protection level to call MiniDumpWriteDump and suspend EDR/AV processes, allowing malicious activity to execute undetected during the suspension period.

WindowsProcess Access
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 27windows
Detectionhighexperimental

Windows AMSI Related Registry Tampering Via CommandLine

Detects tampering of AMSI (Anti-Malware Scan Interface) related registry values via command line tools such as reg.exe or PowerShell. AMSI provides a generic interface for applications and services to integrate with antimalware products. Adversaries may disable AMSI to evade detection of malicious scripts and code execution.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1562.006 · Indicator Blocking
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Dec 25windows
Detectionhighexperimental

Suspicious ArcSOC.exe Child Process

Detects script interpreters, command-line tools, and similar suspicious child processes of ArcSOC.exe. ArcSOC.exe is the process name which hosts ArcGIS Server REST services. If an attacker compromises an ArcGIS Server system and uploads a malicious Server Object Extension (SOE), they can send crafted requests to the corresponding service endpoint and remotely execute code from the ArcSOC.exe process.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterT1203 · Exploitation for Client Execution
Micah BabinskiTue Nov 25windows
Detectionhighexperimental

Suspicious Autorun Registry Modified via WMI

Detects suspicious activity where the WMIC process is used to create an autorun registry entry via reg.exe, which is often indicative of persistence mechanisms employed by malware.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folder+1
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Feb 17windows
Detectionhighexperimental

Suspicious BitLocker Access Agent Update Utility Execution

Detects the execution of the BitLocker Access Agent Update Utility (baaupdate.exe) which is not a common parent process for other processes. Suspicious child processes spawned by baaupdate.exe could indicate an attempt at lateral movement via BitLocker DCOM & COM Hijacking.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0008 · Lateral MovementT1021.003 · Distributed Component Object Model
andrewdanis+1Sat Oct 18windows
Detectionhighexperimental

Suspicious CertReq Command to Download

Detects a suspicious CertReq execution downloading a file. This behavior is often used by attackers to download additional payloads or configuration files. Certreq is a built-in Windows utility used to request and retrieve certificates from a certification authority (CA). However, it can be abused by threat actors for malicious purposes.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Christian Burkard (Nextron Systems)Wed Nov 24windows
Detectionmediumexperimental

Cmd Launched with Hidden Start Flags to Suspicious Targets

Detects cmd.exe executing commands with the "start" utility using "/b" (no window) or "/min" (minimized) flags. To reduce false positives from standard background tasks, detection is restricted to scenarios where the target is a known script extension or located in suspicious temporary/public directories. This technique was observed in Chaos, DarkSide, and Emotet malware campaigns.

WindowsProcess Creation
TA0005 · Defense EvasionT1564.003 · Hidden Window
Vladan Sekulic+1Sat Jan 24windows
Detectionmediumexperimental

OpenEDR Spawning Command Shell

Detects the OpenEDR ssh-shellhost.exe spawning a command shell (cmd.exe) or PowerShell with PTY (pseudo-terminal) capabilities. This may indicate remote command execution through OpenEDR's remote management features, which could be legitimate administrative activity or potential abuse of the remote access tool. Threat actors may leverage OpenEDR's remote shell capabilities to execute commands on compromised systems, facilitating lateral movement or other command-and-control operations.

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellTA0008 · Lateral MovementT1021.004 · SSH+2
kostastsaleThu Feb 19windows
Detectionhighexperimental

Potentially Suspicious Child Processes Spawned by ConHost

Detects suspicious child processes related to Windows Shell utilities spawned by `conhost.exe`, which could indicate malicious activity using trusted system components.

WindowsProcess Creation
T1202 · Indirect Command ExecutionTA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionmediumexperimental

New DMSA Service Account Created in Specific OUs

Detects the creation of a dMSASvc account using the New-ADServiceAccount cmdlet in certain OUs. The fact that the Cmdlet is used to create a dMSASvc account in a specific OU is highly suspicious. It is a pattern trying to exploit the BadSuccessor privilege escalation vulnerability in Windows Server 2025. On top of that, if the user that is creating the dMSASvc account is not a legitimate administrator or does not have the necessary permissions, it is a strong signal of an attempted or successful abuse of the BaDSuccessor vulnerability for privilege escalation within the Windows Server 2025 Active Directory environment.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+2
Swachchhanda Shrawan Poudel (Nextron Systems)Sat May 24windows
Detectionhighexperimental

Windows Credential Guard Registry Tampering Via CommandLine

Detects attempts to add, modify, or delete Windows Credential Guard related registry keys or values via command line tools such as Reg.exe or PowerShell. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation. The rule matches suspicious command lines that target DeviceGuard or LSA registry paths and manipulate keys like EnableVirtualizationBasedSecurity, RequirePlatformSecurityFeatures, or LsaCfgFlags. Such activity may indicate an attempt to disable or tamper with Credential Guard, potentially exposing sensitive credentials for misuse.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Dec 26windows
Detectionhighexperimental

PowerShell Defender Threat Severity Default Action Set to 'Allow' or 'NoAction'

Detects the use of PowerShell to execute the 'Set-MpPreference' cmdlet to configure Windows Defender's threat severity default action to 'Allow' (value '6') or 'NoAction' (value '9'). This is a highly suspicious configuration change that effectively disables Defender's ability to automatically mitigate threats of a certain severity level. An attacker might use this technique via the command line to bypass defenses before executing payloads.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Matt Anderson (Huntress)Fri Jul 11windows
Detectionhighexperimental

Windows Defender Context Menu Removed

Detects the use of reg.exe or PowerShell to delete the Windows Defender context menu handler registry keys. This action removes the "Scan with Microsoft Defender" option from the right-click menu for files, directories, and drives. Attackers may use this technique to hinder manual, on-demand scans and reduce the visibility of the security product.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Matt Anderson (Huntress)Wed Jul 09windows
Detectionhighexperimental

Devcon Execution Disabling VMware VMCI Device

Detects execution of devcon.exe with commands that disable the VMware Virtual Machine Communication Interface (VMCI) device. This can be legitimate during VMware Tools troubleshooting or driver conflicts, but may also indicate malware attempting to hijack communication with the hardware via the VMCI device. This has been used to facilitate VMware ESXi vulnerability exploits to escape VMs and execute code on the ESXi host.

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service+1
Matt Anderson+2Fri Jan 02windows
Detectionlowexperimental

System Information Discovery via Registry Queries

Detects attempts to query system information directly from the Windows Registry.

WindowsProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
lazargThu Jun 12windows
Detectionhighexperimental

Security Event Logging Disabled via MiniNt Registry Key - Process

Detects attempts to disable security event logging by adding the `MiniNt` registry key. This key is used to disable the Windows Event Log service, which collects and stores event logs from the operating system and applications. Adversaries may want to disable this service to prevent logging of security events that could be used to detect their activities.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1562.002 · Disable Windows Event LoggingT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 09windows
Detectionhighexperimental

Suspicious Child Process of Notepad++ Updater - GUP.Exe

Detects suspicious child process creation by the Notepad++ updater process (gup.exe). This could indicate potential exploitation of the updater component to deliver unwanted malware.

WindowsProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1195.002 · Compromise Software Supply ChainTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Feb 03windows
Detectionhighexperimental

HackTool - Doppelanger LSASS Dumper Execution

Detects the execution of the Doppelanger hacktool which is used to dump LSASS memory via process cloning while evading common detection methods

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Jul 01windows
Detectionhighexperimental

Hacktool - EDR-Freeze Execution

Detects execution of EDR-Freeze, a tool that exploits the MiniDumpWriteDump function and WerFaultSecure.exe to suspend EDR and Antivirus processes on Windows. EDR-Freeze leverages a race-condition attack to put security processes into a dormant state by suspending WerFaultSecure at the moment it freezes the target process. This technique does not require kernel-level exploits or BYOVD, but instead abuses user-mode functionality to temporarily disable monitoring by EDR or Antimalware solutions.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 24windows
Detectionhighexperimental

HackTool - HollowReaper Execution

Detects usage of HollowReaper, a process hollowing shellcode launcher used for stealth payload execution through process hollowing. It replaces the memory of a legitimate process with custom shellcode, allowing the attacker to execute payloads under the guise of trusted binaries.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.012 · Process Hollowing
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Jul 01windows
Detectionmediumexperimental

HackTool - LaZagne Execution

Detects the execution of the LaZagne. A utility used to retrieve multiple types of passwords stored on a local computer. LaZagne has been leveraged multiple times by threat actors in order to dump credentials.

WindowsProcess Creation
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)+1Mon Jun 24windows
Detectionhighexperimental

HKTL - SharpSuccessor Privilege Escalation Tool Execution

Detects the execution of SharpSuccessor, a tool used to exploit the BadSuccessor attack for privilege escalation in WinServer 2025 Active Directory environments. Successful usage of this tool can let the attackers gain the domain admin privileges by exploiting the BadSuccessor vulnerability.

WindowsProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 06windows
Detectionhighexperimental

HackTool - WSASS Execution

Detects execution of WSASS, a tool used to dump LSASS memory on Windows systems by leveraging WER's (Windows Error Reporting) WerFaultSecure.EXE to bypass PPL (Protected Process Light) protections.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Swachchhanda Shrawan Poudel (Nextron Systems)Sun Nov 23windows
Detectionhighexperimental

Hypervisor-protected Code Integrity (HVCI) Related Registry Tampering Via CommandLine

Detects the tampering of Hypervisor-protected Code Integrity (HVCI) related registry values via command line tool reg.exe. HVCI uses virtualization-based security to protect code integrity by ensuring that only trusted code can run in kernel mode. Adversaries may tamper with HVCI to load malicious or unsigned drivers, which can be used to escalate privileges, maintain persistence, or evade security mechanisms.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Jan 26windows
Detectionmediumexperimental

IIS WebServer Log Deletion via CommandLine Utilities

Detects attempts to delete Internet Information Services (IIS) log files via command line utilities, which is a common defense evasion technique used by attackers to cover their tracks. Threat actors often abuse vulnerabilities in web applications hosted on IIS servers to gain initial access and later delete IIS logs to evade detection.

WindowsProcess Creation
TA0005 · Defense EvasionT1070 · Indicator Removal
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Sep 02windows
Detectionhighexperimental

Attempts of Kerberos Coercion Via DNS SPN Spoofing

Detects the presence of "UWhRC....AAYBAAAA" pattern in command line. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like in CVE-2025-33073. If you see this pattern in the command line, it is likely an attempt to add spoofed Service Principal Names (SPNs) to DNS records, or checking for the presence of such records through the `nslookup` command.

WindowsProcess Creation
TA0009 · CollectionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20windows
Detectionmediumexperimental

Windows Default Domain GPO Modification via GPME

Detects the use of the Group Policy Management Editor (GPME) to modify Default Domain or Default Domain Controllers Group Policy Objects (GPOs). Adversaries may leverage GPME to make stealthy changes in these default GPOs to deploy malicious GPOs configurations across the domain without raising suspicion.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484.001 · Group Policy Modification
TropChaudSat Nov 22windows
Detectionhighexperimental

MMC Executing Files with Reversed Extensions Using RTLO Abuse

Detects malicious behavior where the MMC utility (`mmc.exe`) executes files with reversed extensions caused by Right-to-Left Override (RLO) abuse, disguising them as document formats.

WindowsProcess Creation
TA0002 · ExecutionT1204.002 · Malicious FileTA0005 · Defense EvasionT1218.014 · MMC+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 05windows
Detectionlowexperimental

Windows MSIX Package Support Framework AI_STUBS Execution

Detects execution of Advanced Installer MSIX Package Support Framework (PSF) components, specifically AI_STUBS executables with original filename 'popupwrapper.exe'. This activity may indicate malicious MSIX packages build with Advanced Installer leveraging the Package Support Framework to bypass application control restrictions.

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy ExecutionT1553.005 · Mark-of-the-Web Bypass+1
Michael Haag+1Mon Nov 03windows
Detectionlowexperimental

Notepad Password Files Discovery

Detects the execution of Notepad to open a file that has the string "password" which may indicate unauthorized access to credentials or suspicious activity.

WindowsProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
The DFIR ReportFri Feb 21windows
Detectionhighexperimental

Obfuscated PowerShell MSI Install via WindowsInstaller COM

Detects the execution of obfuscated PowerShell commands that attempt to install MSI packages via the Windows Installer COM object (`WindowsInstaller.Installer`). The technique involves manipulating strings to hide functionality, such as constructing class names using string insertion (e.g., 'indowsInstaller.Installer'.Insert(0,'W')) and correcting malformed URLs (e.g., converting 'htps://' to 'https://') at runtime. This behavior is commonly associated with malware loaders or droppers that aim to bypass static detection by hiding intent in runtime-generated strings and using legitimate tools for code execution. The use of `InstallProduct` and COM object creation, particularly combined with hidden window execution and suppressed UI, indicates an attempt to install software (likely malicious) without user interaction.

WindowsProcess Creation
TA0005 · Defense EvasionT1027.010 · Command ObfuscationT1218.007 · MsiexecTA0002 · Execution+1
Meroujan Antonyan (vx3r)Tue May 27windows
Detectionmediumexperimental

PowerShell MSI Install via WindowsInstaller COM From Remote Location

Detects the execution of PowerShell commands that attempt to install MSI packages via the Windows Installer COM object (`WindowsInstaller.Installer`) hosted remotely. This could be indication of malicious software deployment or lateral movement attempts using Windows Installer functionality. And the usage of WindowsInstaller COM object rather than msiexec could be an attempt to bypass the detection.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellTA0005 · Defense EvasionT1218 · System Binary Proxy Execution+2
Meroujan Antonyan (vx3r)Thu Jun 05windows
Detectionmediumexperimental

Potential PowerShell Console History Access Attempt via History File

Detects potential access attempts to the PowerShell console history directly via history file (ConsoleHost_history.txt). This can give access to plaintext passwords used in PowerShell commands or used for general reconnaissance.

WindowsProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Files
Luc GénauxThu Apr 03windows
Detectionhighexperimental

Suspicious Kerberos Ticket Request via CLI

Detects suspicious Kerberos ticket requests via command line using System.IdentityModel.Tokens.KerberosRequestorSecurityToken class. Threat actors may use command line interfaces to request Kerberos tickets for service accounts in order to perform offline password cracking attacks commonly known as Kerberoasting or other Kerberos ticket abuse techniques like silver ticket attacks.

WindowsProcess Creation
TA0006 · Credential AccessT1558.003 · Kerberoasting
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 18windows
Detectionhighexperimental

Suspicious Uninstall of Windows Defender Feature via PowerShell

Detects the use of PowerShell with Uninstall-WindowsFeature or Remove-WindowsFeature cmdlets to disable or remove the Windows Defender GUI feature, a common technique used by adversaries to evade defenses.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
yxinmiracleFri Aug 22windows
Detectionmediumexperimental

PUA - AdFind.EXE Execution

Detects execution of Adfind.exe utility, which can be used for reconnaissance in an Active Directory environment

WindowsProcess Creation
TA0007 · DiscoveryT1087.002 · Domain Account
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Feb 26windows
Detectionhighexperimental

PUA - Kernel Driver Utility (KDU) Execution

Detects execution of the Kernel Driver Utility (KDU) tool. KDU can be used to bypass driver signature enforcement and load unsigned or malicious drivers into the Windows kernel. Potentially allowing for privilege escalation, persistence, or evasion of security controls.

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.003 · Windows Service
Matt Anderson+2Fri Jan 02windows
Detectionhighexperimental

PUA - Restic Backup Tool Execution

Detects the execution of the Restic backup tool, which can be used for data exfiltration. Threat actors may leverage Restic to back up and exfiltrate sensitive data to remote storage locations, including cloud services. If not legitimately used in the enterprise environment, its presence may indicate malicious activity.

WindowsProcess Creation
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative ProtocolT1567.002 · Exfiltration to Cloud Storage
Nounou Mbeiri+1Fri Oct 17windows
Detectionmediumexperimental

PUA - TruffleHog Execution

Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intended for use in CI pipelines and security assessments, It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.

WindowsProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1083 · File and Directory DiscoveryT1552.001 · Credentials In Files
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 24windows
Detectionlowexperimental

QuickAssist Execution

Detects the execution of Microsoft Quick Assist tool "QuickAssist.exe". This utility can be used by attackers to gain remote access.

WindowsProcess Creation
TA0011 · Command and Controlattack.t1219.002
Muhammad FaisalThu Dec 19windows
Detectionmediumexperimental

RDP Enable or Disable via Win32_TerminalServiceSetting WMI Class

Detects enabling or disabling of Remote Desktop Protocol (RDP) using alternate methods such as WMIC or PowerShell. In PowerShell one-liner commands, the "SetAllowTSConnections" method of the "Win32_TerminalServiceSetting" class may be used to enable or disable RDP. In WMIC, the "rdtoggle" alias or "Win32_TerminalServiceSetting" class may be used for the same purpose.

WindowsProcess Creation
TA0008 · Lateral MovementT1021.001 · Remote Desktop ProtocolTA0002 · ExecutionT1047 · Windows Management Instrumentation
Daniel Koifman (KoifSec)+1Sat Nov 15windows
Detectionmediumexperimental

Windows Recovery Environment Disabled Via Reagentc

Detects attempts to disable windows recovery environment using Reagentc. ReAgentc.exe is a command-line tool in Windows used to manage the Windows Recovery Environment (WinRE). It allows users to enable, disable, and configure WinRE, which is used for troubleshooting and repairing common boot issues.

WindowsProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Daniel Koifman (KoifSec)+1Thu Jul 31windows
Detectionlowexperimental

RegAsm.EXE Execution Without CommandLine Flags or Files

Detects the execution of "RegAsm.exe" without a commandline flag or file, which might indicate potential process injection activity. Usually "RegAsm.exe" should point to a dedicated DLL file or call the help with the "/?" flag.

WindowsProcess Creation
TA0005 · Defense EvasionT1218.009 · Regsvcs/Regasm
François HubautWed Jun 04windows
Detectionhighexperimental

Registry Export of Third-Party Credentials

Detects the use of reg.exe to export registry paths associated with third-party credentials. Credential stealers have been known to use this technique to extract sensitive information from the registry.

WindowsProcess Creation
TA0006 · Credential AccessT1552.002 · Credentials in Registry
Swachchhanda Shrawan Poudel (Nextron Systems)Thu May 22windows
Detectionhighexperimental

RunMRU Registry Key Deletion

Detects deletion of the RunMRU registry key, which stores the history of commands executed via the Run dialog. In the clickfix techniques, the phishing lures instruct users to open a run dialog through (Win + R) and execute malicious commands. Adversaries may delete this key to cover their tracks after executing commands.

WindowsProcess Creation
TA0005 · Defense EvasionT1070.003 · Clear Command History
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Sep 25windows
Detectionhighexperimental

Disabling Windows Defender WMI Autologger Session via Reg.exe

Detects the use of reg.exe to disable the Event Tracing for Windows (ETW) Autologger session for Windows Defender API and Audit events. By setting the 'Start' value to '0' for the 'DefenderApiLogger' or 'DefenderAuditLogger' session, an attacker can prevent these critical security events from being logged, effectively blinding monitoring tools that rely on this data. This is a powerful defense evasion technique.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Matt Anderson (Huntress)Wed Jul 09windows