Classes Autorun Keys Modification
Detects modification of autostart extensibility point (ASEP) in registry.
Sigma rule (View on GitHub)
1title: Classes Autorun Keys Modification
2id: 9df5f547-c86a-433e-b533-f2794357e242
3related:
4 - id: 17f878b8-9968-4578-b814-c4217fc5768c
5 type: obsolete
6status: test
7description: Detects modification of autostart extensibility point (ASEP) in registry.
8references:
9 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md
10 - https://learn.microsoft.com/en-us/sysinternals/downloads/autoruns
11 - https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d # a list with registry keys
12author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split)
13date: 2019-10-25
14modified: 2023-08-17
15tags:
16 - attack.privilege-escalation
17 - attack.persistence
18 - attack.t1547.001
19logsource:
20 category: registry_set
21 product: windows
22detection:
23 selection_classes_base:
24 TargetObject|contains: '\Software\Classes'
25 selection_classes_target:
26 TargetObject|contains:
27 - '\Folder\ShellEx\ExtShellFolderViews'
28 - '\Folder\ShellEx\DragDropHandlers'
29 - '\Folder\Shellex\ColumnHandlers'
30 - '\Filter'
31 - '\Exefile\Shell\Open\Command\(Default)'
32 - '\Directory\Shellex\DragDropHandlers'
33 - '\Directory\Shellex\CopyHookHandlers'
34 - '\CLSID\{AC757296-3522-4E11-9862-C17BE5A1767E}\Instance'
35 - '\CLSID\{ABE3B9A4-257D-4B97-BD1A-294AF496222E}\Instance'
36 - '\CLSID\{7ED96837-96F0-4812-B211-F13C24117ED3}\Instance'
37 - '\CLSID\{083863F1-70DE-11d0-BD40-00A0C911CE86}\Instance'
38 - '\Classes\AllFileSystemObjects\ShellEx\DragDropHandlers'
39 - '\.exe'
40 - '\.cmd'
41 - '\ShellEx\PropertySheetHandlers'
42 - '\ShellEx\ContextMenuHandlers'
43 filter_empty:
44 Details: '(Empty)'
45 filter_msoffice:
46 Details: '{807583E5-5146-11D5-A672-00B0D022E945}'
47 filter_drivers:
48 Image: 'C:\Windows\System32\drvinst.exe'
49 filter_svchost:
50 Image: 'C:\Windows\System32\svchost.exe'
51 # If more targets are found from "svchost". Please exclude the whole image
52 TargetObject|contains: '\lnkfile\shellex\ContextMenuHandlers\'
53 condition: all of selection_* and not 1 of filter_*
54fields:
55 - SecurityID
56 - ObjectName
57 - OldValueType
58 - NewValueType
59falsepositives:
60 - Legitimate software automatically (mostly, during installation) sets up autorun keys for legitimate reason
61 - Legitimate administrator sets up autorun keys for legitimate reason
62level: medium
References
Related rules
- Common Autorun Keys Modification
- CurrentControlSet Autorun Keys Modification
- CurrentVersion Autorun Keys Modification
- CurrentVersion NT Autorun Keys Modification
- Direct Autorun Keys Modification