Microsoft-Windows-Sysmon › Event 14

Event ID 14 — RegistryEvent (Key and Value Rename)

Provider
Microsoft-Windows-Sysmon
Channel
Operational
Collection Priority
Recommended (Palantir, others)
Task
Registry object renamed (rule: RegistryEvent)
Opcode
Info

Description

Registry key and value rename operations map to this event type.

Message #

Registry object renamed:
RuleName: %1
EventType: %2
UtcTime: %3
ProcessGuid: %4
ProcessId: %5
Image: %6
TargetObject: %7
NewName: %8
User: %9

Fields #

NameDescription
EventType UnicodeString → stringRegistry event. Registry key and value renamed
UtcTime UnicodeString → stringTime in UTC when event was created
ProcessGuid GUID → GUIDProcess GUID of the process that renamed a registry value and key
ProcessId UInt32 → PIDProcess ID used by the OS to identify the process that renamed a registry value and key
Image UnicodeString → stringFile path of the process that renamed a registry value and key
TargetObject UnicodeString → stringComplete path of the registry key
NewName UnicodeString → stringNew name of the registry key
RuleName UnicodeString → string
User UnicodeString → string

Detection Patterns #

36 rules

Sigma

Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
Antonlovesdnb, Trent Liffick (@tliffick)
Swachchhanda Shrawan Poudel (Nextron Systems)
Show 26 more (29 total)
Dmitriy Lifanov, oscd.community
Mateusz Wydra, oscd.community
Florian Roth (Nextron Systems), Swachchhanda Shrawan Poude (Nextron Systems)
Florian Roth (Nextron Systems)
Bartlomiej Czyz @bczyz1, oscd.community
Florian Roth (Nextron Systems), @twjackomo, Jonhnathan Ribeiro, oscd.community
oscd.community, Dmitry Uchakin
Christian Burkard (Nextron Systems)
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
Florian Roth (Nextron Systems), wagga, Nasreddine Bencherchali (Splunk STRT)
Avneet Singh @v3t0_, oscd.community
Florian Roth (Nextron Systems)
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
Andreas Hunkeler (@Karneades)

Splunk

Steven Dick, Teoderick Contreras, Splunk
Steven Dick, Teoderick Contreras, Splunk
Show 3 more (6 total)
Steven Dick, Bhavin Patel, Rod Soto, Teoderick Contreras, Splunk
Steven Dick, Teoderick Contreras, Splunk

Defense Evasion: Modify Registry

8 rules

Sigma

Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
Show 4 more (7 total)
Florian Roth (Nextron Systems), wagga, Nasreddine Bencherchali (Splunk STRT)
Avneet Singh @v3t0_, oscd.community
Swachchhanda Shrawan Poudel (Nextron Systems)

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • Delete Defender Scan ShellEx Context Menu Registry Key source medium: Detects deletion of registry key that adds 'Scan with Defender' option in context menu. Attackers may use this to make it harder for users to scan files that are suspicious.
  • Windows Credential Guard Related Registry Value Deleted - Registry source high: Detects attempts to disable Windows Credential Guard by deleting registry values. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Adversaries may disable Credential Guard to gain access to sensitive credentials stored in the system, such as NTLM hashes and Kerberos tickets, which can be used for lateral movement and privilege escalation.
  • Windows Recall Feature Enabled - DisableAIDataAnalysis Value Deleted source medium: Detects the enabling of the Windows Recall feature via registry manipulation. Windows Recall can be enabled by deleting the existing "DisableAIDataAnalysis" registry value. Adversaries may enable Windows Recall as part of post-exploitation discovery and collection activities. This rule assumes that Recall is already explicitly disabled on the host, and subsequently enabled by the adversary.
Show 7 more (10 total)

References #