SigmaHQ/rules/windows/registry_event/sysmon_asep_reg_keys_modification.yml
2020-09-06 22:10:44 +03:00

39 lines
2.0 KiB
YAML
Executable File

title: Autorun Keys Modification
id: 17f878b8-9968-4578-b814-c4217fc5768c
description: Detects modification of autostart extensibility point (ASEP) in registry
status: experimental
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1060/T1060.yaml
tags:
- attack.persistence
- attack.t1060 # an old one
- attack.t1547.001
date: 2019/10/21
modified: 2020/09/06
author: Victor Sergeev, Daniil Yugoslavskiy, oscd.community
logsource:
category: registry_event
product: windows
detection:
selection:
TargetObject|contains:
- '\software\Microsoft\Windows\CurrentVersion\Run'
- '\software\Microsoft\Windows\CurrentVersion\RunOnce'
- '\software\Microsoft\Windows\CurrentVersion\RunOnceEx'
- '\software\Microsoft\Windows\CurrentVersion\RunServices'
- '\software\Microsoft\Windows\CurrentVersion\RunServicesOnce'
- '\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit'
- '\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell'
- '\software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs' # Appinit DLL
- '\software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs' # Appinit DLL
- '\software\Microsoft\Windows NT\CurrentVersion\Windows\Load' # WindowsShellLoadAndRun in HKCU
- '\software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows\Load' # WindowsShellLoadAndRun in HKCU
- '\software\Microsoft\Windows NT\CurrentVersion\Windows\Run' # WindowsShellLoadAndRun in HKCU
- '\software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows\Run' # WindowsShellLoadAndRun in HKCU
- '\software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders'
condition: selection
falsepositives:
- Legitimate software automatically (mostly, during installation) sets up autorun keys for legitimate reason
- Legitimate administrator sets up autorun keys for legitimate reason
level: medium