Rule Library

Sigma Rules

94 rules found for "attack.T1112"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Remote Registry Lateral Movement

Detects remote RPC calls to modify the registry and possible execute code

rpc_firewallapplication
TA0005 · Defense EvasionTA0008 · Lateral MovementT1112 · Modify RegistryTA0003 · Persistence
Sagie Dulce+1Sat Jan 01application
Detectionhightest

ETW Logging Disabled In .NET Processes - Registry

Potential adversaries stopping ETW providers recording loaded .NET assemblies.

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify RegistryT1562 · Impair Defenses
Roberto Rodriguez (Cyb3rWard0g)+1Fri Jun 05windows
Detectionhightest

NetNTLM Downgrade Attack

Detects NetNTLM downgrade attack

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1112 · Modify Registry
Florian Roth (Nextron Systems)+1Tue Mar 20windows
Detectionhightest

Sysmon Channel Reference Deletion

Potential threat actor tampering with Sysmon manifest and eventually disabling it

Windowssecurity
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Roberto Rodriguez (Cyb3rWard0g)+1Tue Jul 14windows
Detectionmediumexperimental

Registry Modification Attempt Via VBScript - PowerShell

Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods embedded within PowerShell scripts or commands. Threat actors commonly embed VBScript code within PowerShell to perform registry modifications, attempting to evade detection that monitors for direct registry access through traditional tools. This technique can be used for persistence, defense evasion, and privilege escalation by modifying registry keys without using regedit.exe, reg.exe, or PowerShell's native registry cmdlets.

WindowsPowerShell Script
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Aug 13windows
Detectionhightest

New DNS ServerLevelPluginDll Installed Via Dnscmd.EXE

Detects the installation of a DNS plugin DLL via ServerLevelPluginDll parameter in registry, which can be used to execute code in context of the DNS server (restart required)

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking+1
Florian Roth (Nextron Systems)Mon May 08windows
Detectionhighexperimental

Security Event Logging Disabled via MiniNt Registry Key - Process

Detects attempts to disable security event logging by adding the `MiniNt` registry key. This key is used to disable the Windows Event Log service, which collects and stores event logs from the operating system and applications. Adversaries may want to disable this service to prevent logging of security events that could be used to detect their activities.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1562.002 · Disable Windows Event LoggingT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 09windows
Detectionmediumtest

Imports Registry Key From a File

Detects the import of the specified file to the registry with regedit.exe.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Oddvar Moe+2Wed Oct 07windows
Detectionhightest

Imports Registry Key From an ADS

Detects the import of a alternate datastream to the registry with regedit.exe.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Oddvar Moe+2Mon Oct 12windows
Detectionhightest

Suspicious Registry Modification From ADS Via Regini.EXE

Detects the import of an alternate data stream with regini.exe, regini.exe can be used to modify registry keys.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Eli Salem+2Mon Oct 12windows
Detectionlowtest

Registry Modification Via Regini.EXE

Detects the execution of regini.exe which can be used to modify registry keys, the changes are imported from one or more text files.

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
Eli Salem+2Thu Oct 08windows
Detectionmediumtest

Potentially Suspicious Desktop Background Change Using Reg.EXE

Detects the execution of "reg.exe" to alter registry keys that would replace the user's desktop background. This is a common technique used by malware to change the desktop background to a ransom note or other image.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0040 · ImpactT1112 · Modify Registry+1
Stephen Lincoln (AttackIQ)Thu Dec 21windows
Detectionmediumtest

Potential Suspicious Registry File Imported Via Reg.EXE

Detects the import of '.reg' files from suspicious paths using the 'reg.exe' utility

WindowsProcess Creation
TA0003 · PersistenceT1112 · Modify RegistryTA0005 · Defense Evasion
François Hubaut+1Mon Aug 01windows
Detectionhightest

RestrictedAdminMode Registry Value Tampering - ProcCreation

Detects changes to the "DisableRestrictedAdmin" registry value in order to disable or enable RestrictedAdmin mode. RestrictedAdmin mode prevents the transmission of reusable credentials to the remote system to which you connect using Remote Desktop. This prevents your credentials from being harvested during the initial connection process if the remote server has been compromise

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautFri Jan 13windows
Detectionhightest

Enable LM Hash Storage - ProcCreation

Detects changes to the "NoLMHash" registry value in order to allow Windows to store LM Hashes. By setting this registry value to "0" (DWORD), Windows will be allowed to store a LAN manager hash of your password in Active Directory and local SAM databases.

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Fri Dec 15windows
Detectionhightest

Potential Tampering With RDP Related Registry Keys Via Reg.EXE

Detects the execution of "reg.exe" for enabling/disabling the RDP service on the host by tampering with the 'CurrentControlSet\Control\Terminal Server' values

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol+1
Martin Mueller+1Sat Feb 12windows
Detectionhightest

Reg Add Suspicious Paths

Detects when an adversary uses the reg.exe utility to add or modify new keys or subkeys

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify RegistryT1562.001 · Disable or Modify Tools
François Hubaut+1Fri Aug 19windows
Detectionhighstable

ShimCache Flush

Detects actions that clear the local ShimCache and remove forensic evidence

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Florian Roth (Nextron Systems)Mon Feb 01windows
Detectionlowtest

Run Once Task Execution as Configured in Registry

This rule detects the execution of Run Once task as configured in the registry

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Avneet Singh+2Sun Oct 18windows
Detectionhightest

Non-privileged Usage of Reg or Powershell

Search for usage of reg or Powershell by non-privileged users to modify service configuration in registry

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Teymur Kheirkhabarov+2Mon Oct 05windows
Detectionmediumtest

Registry Modification of MS-settings Protocol Handler

Detects registry modifications to the 'ms-settings' protocol handler, which is frequently targeted for UAC bypass or persistence. Attackers can modify this registry to execute malicious code with elevated privileges by hijacking the command execution path.

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationTA0003 · PersistenceT1548.002 · Bypass User Account Control+2
François Hubaut+1Mon Dec 20windows
Detectionhighexperimental

User Shell Folders Registry Modification via CommandLine

Detects modifications to User Shell Folders registry values via reg.exe or PowerShell, which could indicate persistence attempts. Attackers may modify User Shell Folders registry values to point to malicious executables or scripts that will be executed during startup. This technique is often used to maintain persistence on a compromised system by ensuring that malicious payloads are executed automatically.

WindowsProcess Creation
TA0003 · PersistenceTA0004 · Privilege EscalationT1547.001 · Registry Run Keys / Startup FolderTA0005 · Defense Evasion+1
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Jan 05windows
Detectionmediumexperimental

Registry Modification Attempt Via VBScript

Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods via common LOLBINs. It could be an attempt to modify the registry for persistence without using straightforward methods like regedit.exe, reg.exe, or PowerShell. Threat Actors may use this technique to evade detection by security solutions that monitor for direct registry modifications through traditional tools.

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Aug 13windows
Detectionmediumtest

Suspicious VBoxDrvInst.exe Parameters

Detect VBoxDrvInst.exe run with parameters allowing processing INF file. This allows to create values in the registry and install drivers. For example one could use this technique to obtain persistence via modifying one of Run or RunOnce registry keys

WindowsProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Konstantin Grishchenko+1Tue Oct 06windows
Detectionmediumexperimental

Registry Manipulation via WMI Stdregprov

Detects the usage of wmic.exe to manipulate Windows registry via the WMI StdRegProv class. This behaviour could be potentially suspicious because it uses an alternative method to modify registry keys instead of legitimate registry tools like reg.exe or regedit.exe. Attackers specifically choose this technique to evade detection and bypass security monitoring focused on traditional registry modification commands.

WindowsProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0005 · Defense EvasionTA0007 · Discovery+3
Daniel Koifman (KoifSec)Wed Jul 30windows
Detectionhightest

Terminal Server Client Connection History Cleared - Registry

Detects the deletion of registry keys containing the MSTSC connection history

WindowsRegistry Delete
TA0003 · PersistenceTA0005 · Defense EvasionT1070 · Indicator RemovalT1112 · Modify Registry
Christian Burkard (Nextron Systems)Tue Oct 19windows
Detectionmediumtest

Removal of Potential COM Hijacking Registry Keys

Detects any deletion of entries in ".*\shell\open\command" registry keys. These registry keys might have been used for COM hijacking activities by a threat actor or an attacker and the deletion could indicate steps to remove its tracks.

WindowsRegistry Delete
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Detectionhightest

Disable Security Events Logging Adding Reg Key MiniNt

Detects the addition of a key 'MiniNt' to the registry. Upon a reboot, Windows Event Log service will stop writing events.

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1562.002 · Disable Windows Event LoggingT1112 · Modify Registry+1
Ilyas Ochkov+1Fri Oct 25windows
Detectionhightest

Wdigest CredGuard Registry Modification

Detects potential malicious modification of the property value of IsCredGuardEnabled from HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest to disable Cred Guard on a system. This is usually used with UseLogonCredential to manipulate the caching credentials.

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Roberto Rodriguez (Cyb3rWard0g)+1Sun Aug 25windows
Detectionhightest

Potential Qakbot Registry Activity

Detects a registry key used by IceID in a campaign that distributes malicious OneNote files

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Hieu TranMon Mar 13windows
Detectioncriticaltest

Registry Entries For Azorult Malware

Detects the presence of a registry key created during Azorult execution

WindowsRegistry Event
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry
Trent LiffickFri May 08windows
Detectionhightest

NetNTLM Downgrade Attack - Registry

Detects NetNTLM downgrade attack

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1112 · Modify Registry
Florian Roth (Nextron Systems)+2Tue Mar 20windows
Detectionhightest

RedMimicry Winnti Playbook Registry Manipulation

Detects actions caused by the RedMimicry Winnti playbook

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Alexander RauschWed Jun 24windows
Detectionmediumtest

Run Once Task Configuration in Registry

Rule to detect the configuration of Run Once registry key. Configured payload can be run by runonce.exe /AlternateShellStartup

WindowsRegistry Event
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Avneet Singh+1Sun Nov 15windows
Detectionmediumexperimental

Registry Tampering by Potentially Suspicious Processes

Detects suspicious registry modifications made by suspicious processes such as script engine processes such as WScript, or CScript etc. These processes are rarely used for legitimate registry modifications, and their activity may indicate an attempt to modify the registry without using standard tools like regedit.exe or reg.exe, potentially for evasion and persistence.

WindowsRegistry Event
TA0005 · Defense EvasionTA0003 · PersistenceTA0002 · ExecutionT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Aug 13windows
Detectionmediumtest

Allow RDP Remote Assistance Feature

Detect enable rdp feature to allow specific user to rdp connect on the targeted machine

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautFri Aug 19windows
Detectionmediumtest

New BgInfo.EXE Custom DB Path Registry Configuration

Detects setting of a new registry database value related to BgInfo configuration. Attackers can for example set this value to save the results of the commands executed by BgInfo in order to exfiltrate information.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Wed Aug 16windows
Detectionmediumtest

New BgInfo.EXE Custom VBScript Registry Configuration

Detects setting of a new registry value related to BgInfo configuration, which can be abused to execute custom VBScript via "BgInfo.exe"

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Wed Aug 16windows
Detectionmediumtest

New BgInfo.EXE Custom WMI Query Registry Configuration

Detects setting of a new registry value related to BgInfo configuration, which can be abused to execute custom WMI query via "BgInfo.exe"

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Nasreddine Bencherchali (Nextron Systems)Wed Aug 16windows
Detectionmediumtest

ClickOnce Trust Prompt Tampering

Detects changes to the ClickOnce trust prompt registry key in order to enable an installation from different locations such as the Internet.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
@serkinvalery+1Mon Jun 12windows
Detectionmediumtest

CrashControl CrashDump Disabled

Detects disabling the CrashDump per registry (as used by HermeticWiper)

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1564 · Hide ArtifactsT1112 · Modify Registry
Tobias MichalskiThu Feb 24windows
Detectionhighexperimental

Security Event Logging Disabled via MiniNt Registry Key - Registry Set

Detects the addition of the 'MiniNt' key to the registry. Upon a reboot, Windows Event Log service will stop writing events. Windows Event Log is a service that collects and stores event logs from the operating system and applications. It is an important component of Windows security and auditing. Adversary may want to disable this service to disable logging of security events which could be used to detect their activities.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1562.002 · Disable Windows Event LoggingT1112 · Modify Registry+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 09windows
Detectionhightest

Service Binary in Suspicious Folder

Detect the creation of a service with a service binary located in a suspicious directory

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
Florian Roth (Nextron Systems)+1Mon May 02windows
Detectionmediumtest

Potentially Suspicious Desktop Background Change Via Registry

Detects registry value settings that would replace the user's desktop background. This is a common technique used by malware to change the desktop background to a ransom note or other image.

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionTA0040 · ImpactT1112 · Modify Registry+1
Nasreddine Bencherchali (Nextron Systems)+1Thu Dec 21windows
Detectionhightest

DHCP Callout DLL Installation

Detects the installation of a Callout DLL via CalloutDlls and CalloutEnabled parameter in Registry, which can be used to execute code in context of the DHCP server (restart required)

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking+1
Dimitrios SlamarisMon May 15windows
Detectionmediumtest

Disable Internal Tools or Feature in Registry

Detects registry modifications that change features of internal Windows tools (malware like Agent Tesla uses this technique)

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François Hubaut+2Fri Mar 18windows
Detectionmediumtest

Disable Windows Security Center Notifications

Detect set UseActionCenterExperience to 0 to disable the Windows security center notification

WindowsRegistry Set
TA0003 · PersistenceTA0005 · Defense EvasionT1112 · Modify Registry
François HubautFri Aug 19windows
Detectionhighexperimental

Windows Event Log Access Tampering Via Registry

Detects changes to the Windows EventLog channel permission values. It focuses on changes to the Security Descriptor Definition Language (SDDL) string, as modifications to these values can restrict access to specific users or groups, potentially aiding in defense evasion by controlling who can view or modify a event log channel. Upon execution, the user shouldn't be able to access the event log channel via the event viewer or via utilities such as "Get-EventLog" or "wevtutil".

WindowsRegistry Set
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1547.001 · Registry Run Keys / Startup Folder+1
X__JuniorThu Jan 16windows