Skip to content

Commit b664239

Browse files
committed
feat(rules): Hidden registry key creation rule
Identifies the creation of a hidden registry key. Adversaries can utilize the native NtSetValueKey API to create a hidden registry key and conceal payloads or commands used to maintain persistence.
1 parent 3cbc71f commit b664239

File tree

1 file changed

+27
-0
lines changed

1 file changed

+27
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
name: Hidden registry key creation
2+
id: 65deda38-9b1d-42a0-9f40-a68903e81b49
3+
version: 1.0.0
4+
description: |
5+
Identifies the creation of a hidden registry key. Adversaries can utilize the
6+
native NtSetValueKey API to create a hidden registry key and conceal payloads
7+
or commands used to maintain persistence.
8+
labels:
9+
tactic.id: TA0005
10+
tactic.name: Defense Evasion
11+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
12+
technique.id: T1112
13+
technique.name: Modify Registry
14+
technique.ref: https://attack.mitre.org/techniques/T1112/
15+
references:
16+
- https://github.com/outflanknl/SharpHide
17+
18+
condition: >
19+
set_value and kevt.pid != 4 and registry.key.name endswith '\\'
20+
and
21+
thread.callstack.symbols not imatches ('KernelBase.dll!RegSetValue*', 'KernelBase.dll!RegLoadAppKey*', 'KernelBase.dll!GetFileAttributes*')
22+
23+
output: >
24+
Hidden registry key %registry.key.name created by process %ps.exe
25+
severity: high
26+
27+
min-engine-version: 2.2.0

0 commit comments

Comments
 (0)