New RUN Key Pointing to Suspicious Folder
Detects suspicious new RUN key element pointing to an executable in a suspicious folder
Sigma rule (View on GitHub)
1title: New RUN Key Pointing to Suspicious Folder
2id: 02ee49e2-e294-4d0f-9278-f5b3212fc588
3status: experimental
4description: Detects suspicious new RUN key element pointing to an executable in a suspicious folder
5references:
6 - https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html
7 - https://github.com/HackTricks-wiki/hacktricks/blob/e4c7b21b8f36c97c35b7c622732b38a189ce18f7/src/windows-hardening/windows-local-privilege-escalation/privilege-escalation-with-autorun-binaries.md
8author: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing, Swachchhanda Shrawan Poudel (Nextron Systems)
9date: 2018-08-25
10modified: 2025-02-17
11tags:
12 - attack.persistence
13 - attack.t1547.001
14logsource:
15 category: registry_set
16 product: windows
17detection:
18 selection_target:
19 TargetObject|contains:
20 - '\Software\Microsoft\Windows\CurrentVersion\Run'
21 - '\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run'
22 - '\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run'
23 selection_suspicious_paths_1:
24 Details|contains:
25 - ':\Perflogs'
26 - :\ProgramData'
27 - ':\Windows\Temp'
28 - ':\Temp'
29 - '\AppData\Local\Temp'
30 - '\AppData\Roaming'
31 - ':\$Recycle.bin'
32 - ':\Users\Default'
33 - ':\Users\public'
34 - '%temp%'
35 - '%tmp%'
36 - '%Public%'
37 - '%AppData%'
38 selection_suspicious_paths_user_1:
39 Details|contains: ':\Users\'
40 selection_suspicious_paths_user_2:
41 Details|contains:
42 - '\Favorites'
43 - '\Favourites'
44 - '\Contacts'
45 - '\Music'
46 - '\Pictures'
47 - '\Documents'
48 - '\Photos'
49 filter_main_windows_update:
50 TargetObject|contains: '\Microsoft\Windows\CurrentVersion\RunOnce\'
51 Image|startswith: 'C:\Windows\SoftwareDistribution\Download\'
52 Details|contains|all:
53 - 'rundll32.exe '
54 - 'C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32'
55 Details|contains:
56 - '\AppData\Local\Temp\'
57 - 'C:\Windows\Temp\'
58 condition: selection_target and (selection_suspicious_paths_1 or (all of selection_suspicious_paths_user_* )) and not 1 of filter_main_*
59falsepositives:
60 - Software using weird folders for updates
61level: high
References
Related rules
- Direct Autorun Keys Modification
- Potential Persistence Attempt Via Run Keys Using Reg.EXE
- Suspicious Autorun Registry Modified via WMI
- Suspicious Powershell In Registry Run Keys
- Suspicious Run Key from Download