Detection rules › By event
Microsoft-Windows-Sysmon event 12
Sigma (33)
- Atbroker Registry Change
- CMSTP Execution Registry Event
- Creation of a Local Hidden User Account by Registry
- Disable Security Events Logging Adding Reg Key MiniNt
- DLL Load via LSASS
- Esentutl Volume Shadow Copy Service Keys
- HybridConnectionManager Service Installation - Registry
- Narrator's Feedback-Hub Persistence
- NetNTLM Downgrade Attack - Registry
- New DLL Added to AppCertDlls Registry Key
- New DLL Added to AppInit_DLLs Registry Key
- New PortProxy Registry Entry Added
- Office Application Startup - Office Test
- Path To Screensaver Binary Modified
- Potential Credential Dumping Via LSASS SilentProcessExit Technique
- Potential Persistence Via Disk Cleanup Handler - Registry
- Potential Qakbot Registry Activity
- RedMimicry Winnti Playbook Registry Manipulation
- Registry Entries For Azorult Malware
- Registry Persistence Mechanisms in Recycle Bin
- Registry Tampering by Potentially Suspicious Processes
- Run Once Task Configuration in Registry
- Security Support Provider (SSP) Added to LSA Configuration
- Shell Open Registry Keys Manipulation
- Sticky Key Like Backdoor Usage - Registry
- Suspicious Camera and Microphone Access
- Suspicious Run Key from Download
- UAC Bypass Via Wsreset
- Wdigest CredGuard Registry Modification
- Windows Credential Editor Registry
- Windows Defender Threat Severity Default Action Modified
- Windows Registry Trust Record Modification
- WINEKEY Registry Modification
Splunk (13)
- Add DefaultUser And Password In Registry
- Malicious InProcServer32 Modification
- Remcos client registry install entry
- Revil Registry Entry
- Sdclt UAC Bypass
- Windows Deleted Registry By A Non Critical Process File Path
- Windows Modify Registry Delete Firewall Rules
- Windows RDP Server Registry Deletion
- Windows Registry Delete Task SD
- Windows RunMRU Registry Key or Value Deleted
- Windows USBSTOR Registry Key Modification
- Windows WPDBusEnum Registry Key Modification
- WSReset UAC Bypass