System Language Discovery via Reg.Exe
Detects the usage of Reg.Exe to query system language settings. Attackers may discover the system language to determine the geographic location of victims, customize payloads for specific regions, or avoid targeting certain locales to evade detection.
Sigma rule (View on GitHub)
1title: System Language Discovery via Reg.Exe
2id: c43a5405-e8e1-4221-9ac9-dbe3fa14e886
3status: experimental
4description: |
5 Detects the usage of Reg.Exe to query system language settings.
6 Attackers may discover the system language to determine the geographic location of victims, customize payloads for specific regions,
7 or avoid targeting certain locales to evade detection.
8references:
9 - https://scythe.io/threat-thursday/threatthursday-darkside-ransomware
10author: Marco Pedrinazzi (@pedrinazziM) (InTheCyber)
11date: 2026-01-09
12tags:
13 - attack.discovery
14 - attack.t1614.001
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection_img:
20 - Image|endswith: '\reg.exe'
21 - OriginalFileName: 'reg.exe'
22 selection_cli:
23 CommandLine|contains|all:
24 - 'query'
25 - 'Control\Nls\Language'
26 condition: all of selection_*
27falsepositives:
28 - Unknown
29level: medium
30regression_tests_path: regression_data/rules/windows/process_creation/proc_creation_win_reg_system_language_discovery/info.yml
31simulation:
32 - type: atomic-red-team
33 name: Discover System Language by Registry Query
34 technique: T1614.001
35 atomic_guid: 631d4cf1-42c9-4209-8fe9-6bd4de9421be
References
Related rules
- Console CodePage Lookup Via CHCP
- BloodHound Collection Files
- OpenCanary - Host Port Scan (SYN Scan)
- OpenCanary - NMAP FIN Scan
- OpenCanary - NMAP NULL Scan