Add file from suspicious location to autostart registry

Add file from suspicious location to autostart registry

Sigma rule (View on GitHub)

 1title: Add file from suspicious location to autostart registry
 2status: experimental
 3description: Add file from suspicious location to autostart registry
 4author: Joe Security
 5date: 2020-03-19
 6id: 200067
 7threatname:
 8behaviorgroup: 2
 9classification: 4
10mitreattack:
11
12logsource:
13    category: process_creation
14    product: windows
15detection:
16    selection:
17        CommandLine:
18            - '*reg add *\windows\currentversion\run /f /v *\appdata\roaming*'
19            - '*reg add *\windows\currentversion\run /v *\appdata\local*'
20            - '*reg add *\software\microsoft\windows nt\currentversion\windows*/v load*appdata\roaming*'
21    condition: selection
22level: critical
to-top