behavior/rules/windows/defense_evasion_suspicious_remote_registry_modification.toml (75 lines of code) (raw):
[rule]
description = """
Identifies registry modification via the Remote Registry service to point to an executable or script file. This may
indicate attempt to move laterally via remote configuration changes.
"""
id = "01c2b2e3-a0a9-4ad1-92e2-1aa80d70de50"
license = "Elastic License v2"
name = "Suspicious Remote Registry Modification"
os_list = ["windows"]
version = "1.0.15"
query = '''
registry where event.action == "modification" and user.id : ("S-1-5-21*", "S-1-12-*") and
process.name : "svchost.exe" and process.thread.Ext.call_stack_summary : "*regsvc.dll|rpcrt4.dll*" and
(
registry.data.strings : ("*:\\*\\*", "*.exe*", "*.dll*", "*rundll32*", "*powershell*", "*.exe*http*", "* /c *", "*COMSPEC*", "\\\\*.*") or
registry.path :
("HKLM\\SYSTEM\\ControlSet*\\Services\\*\\ServiceDLL",
"HKLM\\SYSTEM\\ControlSet*\\Services\\*\\ImagePath",
"HKEY_USERS\\*Classes\\*\\InprocServer32\\",
"HKEY_USERS\\*Classes\\*\\LocalServer32\\",
"H*\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\*",
"HKLM\\SOFTWARE\\Classes\\AppID\\*",
"HKEY_USERS\\*Classes\\AppID\\*",
"HKLM\\SYSTEM\\ControlSet*\\Control\\Lsa\\*") or
(registry.value : "Start" and registry.data.strings : "4")
) and
not registry.data.strings : "C:\\Windows\\System32\\svchost.exe -k localService" and
not registry.path : ("HKLM\\SOFTWARE\\Microsoft\\SMS\\*",
"HKLM\\SYSTEM\\*ControlSet*\\Services\\EventLog\\*",
"HKLM\\SOFTWARE\\EMCO\\Remote Agents\\Remote Installer\\*",
"HKLM\\SOFTWARE\\Microsoft\\Service Fabric\\*",
"HKLM\\SOFTWARE\\WOW6432Node\\Varonis\\*",
"HKLM\\SOFTWARE\\Varonis\\*",
"HKLM\\SOFTWARE\\JavaSoft\\*",
"HKLM\\SOFTWARE\\WOW6432Node\\ODBC\\ODBC.INI\\*",
"HKLM\\SYSTEM\\ControlSet001\\Control\\Session Manager\\PendingFileRenameOperations",
"HKLM\\SYSTEM\\ControlSet001\\Services\\mrxsmb10\\Start",
"HKLM\\SOFTWARE\\WOW6432Node\\JavaSoft\\*",
"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\UserLockInternetURL",
"HKLM\\SYSTEM\\ControlSet001\\Services\\MTAppManager\\ImagePath",
"HKLM\\SYSTEM\\ControlSet001\\Services\\MAST\\ImagePath",
"HKLM\\SYSTEM\\ControlSet001\\Services\\VMagicPPII\\ImagePath",
"HKLM\\SYSTEM\\ControlSet001\\Services\\MEDITECH*",
"HKLM\\SYSTEM\\ControlSet001\\Services\\ANPServer*",
"HKLM\\SYSTEM\\ControlSet001\\Services\\MSO\\ImagePath",
"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Print\\Printers\\*\\sPMigratedPrinterName")
'''
actions = []
min_endpoint_version = "8.7.0"
[[optional_actions]]
action = "rollback"
field = "process.entity_id"
state = 0
[[threat]]
framework = "MITRE ATT&CK"
[[threat.technique]]
id = "T1112"
name = "Modify Registry"
reference = "https://attack.mitre.org/techniques/T1112/"
[threat.tactic]
id = "TA0005"
name = "Defense Evasion"
reference = "https://attack.mitre.org/tactics/TA0005/"
[[threat]]
framework = "MITRE ATT&CK"
[[threat.technique]]
id = "T1021"
name = "Remote Services"
reference = "https://attack.mitre.org/techniques/T1021/"
[threat.tactic]
id = "TA0008"
name = "Lateral Movement"
reference = "https://attack.mitre.org/tactics/TA0008/"
[internal]
min_endpoint_version = "8.7.0"