Registry Modification Attempt Via VBScript
Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods via common LOLBINs. It could be an attempt to modify the registry for persistence without using straightforward methods like regedit.exe, reg.exe, or PowerShell. Threat Actors may use this technique to evade detection by security solutions that monitor for direct registry modifications through traditional tools.
Sigma rule (View on GitHub)
1title: Registry Modification Attempt Via VBScript
2id: 921aa10f-2e74-4cca-9498-98f9ca4d6fdf
3related:
4 - id: 2a0a169d-cc66-43ce-9ae2-6e678e54e46a
5 type: similar
6 - id: 7f4c43f9-b1a5-4c7d-b24a-b41bf3a3ebf2
7 type: similar
8status: experimental
9description: |
10 Detects attempts to modify the registry using VBScript's CreateObject("Wscript.shell") and RegWrite methods via common LOLBINs.
11 It could be an attempt to modify the registry for persistence without using straightforward methods like regedit.exe, reg.exe, or PowerShell.
12 Threat Actors may use this technique to evade detection by security solutions that monitor for direct registry modifications through traditional tools.
13references:
14 - https://www.linkedin.com/posts/mauricefielenbach_livingofftheland-redteam-persistence-activity-7344801774182051843-TE00/
15 - https://www.nextron-systems.com/2025/07/29/detecting-the-most-popular-mitre-persistence-method-registry-run-keys-startup-folder/
16date: 2025-08-13
17author: Swachchhanda Shrawan Poudel (Nextron Systems)
18tags:
19 - attack.defense-evasion
20 - attack.persistence
21 - attack.execution
22 - attack.t1112
23 - attack.t1059.005
24logsource:
25 category: process_creation
26 product: windows
27detection:
28 selection:
29 CommandLine|contains|all:
30 - 'CreateObject'
31 - 'Wscript.shell'
32 - '.RegWrite'
33 condition: selection
34falsepositives:
35 - Unknown
36level: medium
References
Related rules
- Registry Modification Attempt Via VBScript - PowerShell
- Registry Tampering by Potentially Suspicious Processes
- Potential Ursnif Malware Activity - Registry
- Blue Mockingbird - Registry
- Blue Mockingbird