You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: The following analytic detects modifications to the Windows registry
8
+
description:
9
+
The following analytic detects modifications to the Windows registry
9
10
aimed at disabling the Registry Editor (regedit). It leverages data from the Endpoint.Registry
10
11
data model, specifically monitoring changes to the registry path "*\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\DisableRegistryTools"
11
12
with a value of "0x00000001". This activity is significant because malware, such
@@ -14,60 +15,63 @@ description: The following analytic detects modifications to the Windows registr
14
15
could hinder incident response efforts and allow the attacker to maintain control
15
16
over the compromised system.
16
17
data_source:
17
-
- Sysmon EventID 13
18
-
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
18
+
- Sysmon EventID 13
19
+
search:
20
+
'| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
19
21
as lastTime FROM datamodel=Endpoint.Registry WHERE (Registry.registry_path= "*\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\DisableRegistryTools"
20
22
Registry.registry_value_data = "0x00000001") by Registry.action Registry.dest Registry.process_guid
description: The following analytic detects modifications to the Windows registry
8
+
description:
9
+
The following analytic detects modifications to the Windows registry
9
10
that disable the display of hidden files. It leverages data from the Endpoint.Registry
10
11
data model, specifically monitoring changes to registry paths associated with hidden
11
12
file settings. This activity is significant because malware, such as worms and trojan
12
13
spyware, often use hidden files to evade detection. If confirmed malicious, this
13
14
behavior could allow an attacker to conceal malicious files on the system, making
14
15
it harder for security tools and analysts to identify and remove the threat.
15
16
data_source:
16
-
- Sysmon EventID 13
17
-
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
17
+
- Sysmon EventID 13
18
+
search:
19
+
'| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
18
20
as lastTime FROM datamodel=Endpoint.Registry WHERE (Registry.registry_path= "*\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Hidden"
19
21
OR (Registry.registry_path= "*\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\HideFileExt"
20
22
Registry.registry_value_data = "0x00000001") OR (Registry.registry_path= "*\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\ShowSuperHidden"
0 commit comments