WINEKEY Registry Modification

Detects potential malicious modification of run keys by winekey or team9 backdoor

Sigma rule (View on GitHub)

 1title: WINEKEY Registry Modification
 2id: b98968aa-dbc0-4a9c-ac35-108363cbf8d5
 3status: test
 4description: Detects potential malicious modification of run keys by winekey or team9 backdoor
 5references:
 6    - https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html
 7author: omkar72
 8date: 2020-10-30
 9modified: 2021-11-27
10tags:
11    - attack.privilege-escalation
12    - attack.persistence
13    - attack.t1547
14logsource:
15    category: registry_event
16    product: windows
17detection:
18    selection:
19        TargetObject|endswith: 'Software\Microsoft\Windows\CurrentVersion\Run\Backup Mgr'
20    condition: selection
21fields:
22    - ComputerName
23    - Image
24    - EventType
25    - TargetObject
26falsepositives:
27    - Unknown
28level: high

References

Related rules

to-top