Registry Explorer Policy Modification
Detects registry modifications that disable internal tools or functions in explorer (malware like Agent Tesla uses this technique)
Sigma rule (View on GitHub)
1title: Registry Explorer Policy Modification
2id: 1c3121ed-041b-4d97-a075-07f54f20fb4a
3status: test
4description: Detects registry modifications that disable internal tools or functions in explorer (malware like Agent Tesla uses this technique)
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1112/T1112.md
7author: frack113
8date: 2022-03-18
9modified: 2023-08-17
10tags:
11 - attack.defense-evasion
12 - attack.t1112
13logsource:
14 category: registry_set
15 product: windows
16detection:
17 selection_set_1:
18 TargetObject|endswith:
19 - 'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoLogOff'
20 - 'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop'
21 - 'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun'
22 - 'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind'
23 - 'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel'
24 - 'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFileMenu'
25 - 'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoClose'
26 - 'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetTaskbar'
27 - 'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPropertiesMyDocuments'
28 - 'SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayContextMenu'
29 Details: 'DWORD (0x00000001)'
30 condition: selection_set_1
31falsepositives:
32 - Legitimate admin script
33level: medium
References
Related rules
- Activate Suppression of Windows Security Center Notifications
- Add DisallowRun Execution to Registry
- Allow RDP Remote Assistance Feature
- Blackbyte Ransomware Registry
- CVE-2020-1048 Exploitation Attempt - Suspicious New Printer Ports - Registry