Exports Critical Registry Keys To a File

Detects the export of a crital Registry key to a file.

Sigma rule (View on GitHub)

 1title: Exports Critical Registry Keys To a File
 2id: 82880171-b475-4201-b811-e9c826cd5eaa
 3related:
 4    - id: f0e53e89-8d22-46ea-9db5-9d4796ee2f8a
 5      type: similar
 6status: test
 7description: Detects the export of a crital Registry key to a file.
 8references:
 9    - https://lolbas-project.github.io/lolbas/Binaries/Regedit/
10    - https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
11author: Oddvar Moe, Sander Wiebing, oscd.community
12date: 2020-10-12
13modified: 2024-03-13
14tags:
15    - attack.exfiltration
16    - attack.t1012
17logsource:
18    category: process_creation
19    product: windows
20detection:
21    selection_img:
22        - Image|endswith: '\regedit.exe'
23        - OriginalFileName: 'REGEDIT.EXE'
24    selection_cli_1:
25        CommandLine|contains|windash: ' -E '
26    selection_cli_2:
27        CommandLine|contains:
28            - 'hklm'
29            - 'hkey_local_machine'
30    selection_cli_3:
31        CommandLine|endswith:
32            - '\system'
33            - '\sam'
34            - '\security'
35    condition: all of selection_*
36fields:
37    - ParentImage
38    - CommandLine
39falsepositives:
40    - Dumping hives for legitimate purpouse i.e. backup or forensic investigation
41level: high

References

Related rules

to-top