Access To .Reg/.Hive Files By Uncommon Application

Detects file access requests to files ending with either the ".hive"/".reg" extension, usually associated with Windows Registry backups.

Sigma rule (View on GitHub)

 1title: Access To .Reg/.Hive Files By Uncommon Application
 2id: 337a31c6-46c4-46be-886a-260d7aa78cac
 3status: experimental
 4description: Detects file access requests to files ending with either the ".hive"/".reg" extension, usually associated with Windows Registry backups.
 5references:
 6    - https://github.com/tccontre/Reg-Restore-Persistence-Mole
 7author: frack113
 8date: 2023/09/15
 9tags:
10    - attack.t1112
11    - attack.defense_evasion
12logsource:
13    category: file_access
14    product: windows
15    definition: 'Requirements: Microsoft-Windows-Kernel-File ETW provider'
16detection:
17    selection:
18        FileName|endswith:
19            - '.hive'
20            - '.reg'
21    filter_main_generic:
22        Image|contains:
23            - ':\Program Files (x86)\'
24            - ':\Program Files\'
25            - ':\Windows\System32\'
26            - ':\Windows\SysWOW64\'
27    condition: selection and not 1 of filter_main_*
28falsepositives:
29    - Third party software installed in the user context might generate a lot of FPs. Heavy baselining and tuning might be required.
30level: low

References

Related rules

to-top