Imports Registry Key From an ADS

Detects the import of a alternate datastream to the registry with regedit.exe.

Sigma rule (View on GitHub)

 1title: Imports Registry Key From an ADS
 2id: 0b80ade5-6997-4b1d-99a1-71701778ea61
 3related:
 4    - id: 73bba97f-a82d-42ce-b315-9182e76c57b1
 5      type: similar
 6status: test
 7description: Detects the import of a alternate datastream to the registry with regedit.exe.
 8references:
 9    - https://lolbas-project.github.io/lolbas/Binaries/Regedit/
10    - https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
11author: Oddvar Moe, Sander Wiebing, oscd.community
12date: 2020/10/12
13modified: 2024/03/13
14tags:
15    - attack.t1112
16    - attack.defense_evasion
17logsource:
18    category: process_creation
19    product: windows
20detection:
21    selection_img:
22        - Image|endswith: '\regedit.exe'
23        - OriginalFileName: 'REGEDIT.EXE'
24    selection_cli:
25        CommandLine|contains:
26            - ' /i '
27            - '.reg'
28        CommandLine|re: ':[^ \\]'
29    filter:
30        CommandLine|contains|windash:
31            - ' -e '
32            - ' -a '
33            - ' -c '
34    condition: all of selection_* and not filter
35fields:
36    - ParentImage
37    - CommandLine
38falsepositives:
39    - Unknown
40level: high

References

Related rules

to-top