Non-privileged Usage of Reg or Powershell
Search for usage of reg or Powershell by non-privileged users to modify service configuration in registry
Sigma rule (View on GitHub)
1title: Non-privileged Usage of Reg or Powershell
2id: 8f02c935-effe-45b3-8fc9-ef8696a9e41d
3status: test
4description: Search for usage of reg or Powershell by non-privileged users to modify service configuration in registry
5references:
6 - https://image.slidesharecdn.com/kheirkhabarovoffzonefinal-181117201458/95/hunting-for-privilege-escalation-in-windows-environment-20-638.jpg
7author: Teymur Kheirkhabarov (idea), Ryan Plas (rule), oscd.community
8date: 2020-10-05
9modified: 2024-12-01
10tags:
11 - attack.persistence
12 - attack.defense-evasion
13 - attack.t1112
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection_cli:
19 - CommandLine|contains|all:
20 - 'reg '
21 - 'add'
22 - CommandLine|contains:
23 - 'powershell'
24 - 'set-itemproperty'
25 - ' sp '
26 - 'new-itemproperty'
27 selection_data:
28 IntegrityLevel:
29 - 'Medium'
30 - 'S-1-16-8192'
31 CommandLine|contains|all:
32 - 'ControlSet'
33 - 'Services'
34 CommandLine|contains:
35 - 'ImagePath'
36 - 'FailureCommand'
37 - 'ServiceDLL'
38 condition: all of selection_*
39falsepositives:
40 - Unknown
41level: high
References
Related rules
- Activate Suppression of Windows Security Center Notifications
- Add DisallowRun Execution to Registry
- Allow RDP Remote Assistance Feature
- Blackbyte Ransomware Registry
- Blue Mockingbird