Detection rules › Sigma

Non-privileged Usage of Reg or Powershell

Severity
high
Author
Teymur Kheirkhabarov (idea), Ryan Plas (rule), oscd.community
Source
upstream

Search for usage of reg or Powershell by non-privileged users to modify service configuration in registry

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1112 Modify Registry
Defense EvasionT1112 Modify Registry

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: all of selection_cli

or:
CommandLine|contains: add
CommandLine|contains: 'reg '
CommandLine|contains: ' sp '
CommandLine|contains: new-itemproperty
CommandLine|contains: powershell
CommandLine|contains: set-itemproperty

Stage 2: all of selection_data

or:
CommandLine|contains: FailureCommand
CommandLine|contains: ImagePath
CommandLine|contains: ServiceDLL
IntegrityLevel: [Medium, S-1-16-8192]
CommandLine|contains: ControlSet
CommandLine|contains: Services

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • sp
  • ControlSet corpus 3 (sigma 3)
  • FailureCommand corpus 2 (sigma 2)
  • ImagePath corpus 2 (sigma 2)
  • ServiceDLL
  • Services
  • add corpus 16 (sigma 16)
  • new-itemproperty
  • powershell corpus 16 (sigma 16)
  • reg corpus 3 (sigma 3)
  • set-itemproperty
IntegrityLeveleq
  • Medium corpus 3 (sigma 3)
  • S-1-16-8192 corpus 3 (sigma 3)