Detection rules › Sigma

Registry Manipulation via WMI Stdregprov

Severity
medium
Author
Daniel Koifman (KoifSec)
Source
upstream

Detects the usage of wmic.exe to manipulate Windows registry via the WMI StdRegProv class. This behaviour could be potentially suspicious because it uses an alternative method to modify registry keys instead of legitimate registry tools like reg.exe or regedit.exe. Attackers specifically choose this technique to evade detection and bypass security monitoring focused on traditional registry modification commands.

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1047 Windows Management Instrumentation
PersistenceT1112 Modify Registry
Defense EvasionT1112 Modify Registry
DiscoveryT1012 Query Registry

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: all of selection_img

or:
Image|endswith: '\wmic.exe'
OriginalFileName: wmic.exe

Stage 2: all of selection_cli

CommandLine|contains: call
CommandLine|contains: stdregprov

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • call corpus 7 (sigma 7)
  • stdregprov
Imageends_with
  • \wmic.exe corpus 37 (sigma 37)
OriginalFileNameeq
  • wmic.exe corpus 33 (sigma 33)